Описание
ELSA-2016-0083: qemu-kvm security and bug fix update (IMPORTANT)
[1.5.3-105.el7_2.3]
- kvm-fw_cfg-add-check-to-validate-current-entry-value-CVE.patch [bz#1298047]
- Resolves: bz#1298047 (CVE-2016-1714 qemu-kvm: Qemu: nvram: OOB r/w access in processing firmware configurations [rhel-7.2.z])
[1.5.3-105.el7_2.2]
- kvm-raw-posix-Fix-.bdrv_co_get_block_status-for-unaligne.patch [bz#1298828]
- Resolves: bz#1298828 ([abrt] qemu-img: get_block_status(): qemu-img killed by SIGABRT)
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
libcacard
1.5.3-105.el7_2.3
libcacard-devel
1.5.3-105.el7_2.3
libcacard-tools
1.5.3-105.el7_2.3
qemu-img
1.5.3-105.el7_2.3
qemu-kvm
1.5.3-105.el7_2.3
qemu-kvm-common
1.5.3-105.el7_2.3
qemu-kvm-tools
1.5.3-105.el7_2.3
Связанные CVE
Связанные уязвимости
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg. ...
The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access and process crash) or possibly execute arbitrary code via an invalid current entry value in a firmware configuration.