Описание
ELSA-2017-0621: qemu-kvm security and bug fix update (MODERATE)
[0.12.1.2-2.503.el6]
- kvm-cirrus-fix-patterncopy-checks.patch [bz#1420487 bz#1420489]
- kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420487 bz#1420489]
- kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420487 bz#1420489]
- Resolves: bz#1420487 (EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-6.9])
- Resolves: bz#1420489 (EMBARGOED CVE-2017-2620 qemu-kvm-rhev: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-6.9])
[0.12.1.2-2.502.el6]
- kvm-cirrus_vga-fix-division-by-0-for-color-expansion-rop.patch [bz#1418231 bz#1419417]
- kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1418231 bz#1419417]
- kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418231 bz#1419417]
- kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1418231 bz#1419417]
- kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1418231 bz#1419417]
- kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418231 bz#1419417]
- kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418231 bz#1419417]
- kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418231 bz#1419417]
- Resolves: bz#1418231 (CVE-2017-2615 qemu-kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-6.9])
- Resolves: bz#1419417 (CVE-2017-2615 qemu-kvm-rhev: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-6.9])
[0.12.1.2-2.501.el6]
- kvm-Revert-iotests-Use-_img_info.patch [bz#1405882]
- kvm-Revert-block-commit-speed-is-an-optional-parameter.patch [bz#1405882]
- kvm-Revert-iotests-Disable-086.patch [bz#1405882]
- kvm-Revert-iotests-Fix-049-s-reference-output.patch [bz#1405882]
- kvm-Revert-iotests-Fix-026-s-reference-output.patch [bz#1405882]
- kvm-Revert-qcow2-Support-exact-L1-table-growth.patch [bz#1405882]
- kvm-Revert-qcow2-Free-allocated-L2-cluster-on-error.patch [bz#1405882]
- kvm-net-check-packet-payload-length.patch [bz#1398214]
- Resolves: bz#1398214 (CVE-2016-2857 qemu-kvm: Qemu: net: out of bounds read in net_checksum_calculate() [rhel-6.9])
- Reverts: bz#1405882 (test cases 026 030 049 086 and 095 of qemu-iotests fail for qcow2 with qemu-kvm-rhev-0.12.1.2-2.498.el6)
[0.12.1.2-2.500.el6]
- kvm-qcow2-Free-allocated-L2-cluster-on-error.patch [bz#1405882]
- kvm-qcow2-Support-exact-L1-table-growth.patch [bz#1405882]
- kvm-iotests-Fix-026-s-reference-output.patch [bz#1405882]
- kvm-iotests-Fix-049-s-reference-output.patch [bz#1405882]
- kvm-iotests-Disable-086.patch [bz#1405882]
- kvm-block-commit-speed-is-an-optional-parameter.patch [bz#1405882]
- kvm-iotests-Use-_img_info.patch [bz#1405882]
- Resolves: bz#1405882 (test cases 026 030 049 086 and 095 of qemu-iotests fail for qcow2 with qemu-kvm-rhev-0.12.1.2-2.498.el6)
[0.12.1.2-2.499.el6]
- kvm-rename-qemu_aio_context-to-match-upstream.patch [bz#876993]
- kvm-block-stop-relying-on-io_flush-in-bdrv_drain_all.patch [bz#876993]
- kvm-block-add-bdrv_drain.patch [bz#876993]
- kvm-block-avoid-very-long-pauses-at-the-end-of-mirroring.patch [bz#876993]
- Resolves: bz#876993 (qemu-kvm: vms become non-responsive during migrate disk load from 2 domains to a 3ed)
[0.12.1.2-2.498.el6]
- kvm-virtio-introduce-virtqueue_unmap_sg.patch [bz#1392520]
- kvm-virtio-introduce-virtqueue_discard.patch [bz#1392520]
- kvm-virtio-decrement-vq-inuse-in-virtqueue_discard.patch [bz#1392520]
- kvm-balloon-fix-segfault-and-harden-the-stats-queue.patch [bz#1392520]
- kvm-virtio-balloon-discard-virtqueue-element-on-reset.patch [bz#1392520]
- kvm-virtio-zero-vq-inuse-in-virtio_reset.patch [bz#1392520]
- kvm-PATCH-1-4-e1000-pre-initialize-RAH-RAL-registers.patch [bz#1300626]
- kvm-net-update-nic-info-during-device-reset.patch [bz#1300626]
- kvm-net-e1000-update-network-information-when-macaddr-is.patch [bz#1300626]
- kvm-net-rtl8139-update-network-information-when-macaddr-.patch [bz#1300626]
- Resolves: bz#1300626 (e1000/rtl8139: qemu mac address can not be changed via set the hardware address in guest)
- Resolves: bz#1392520 ([RHEL6.9] KVM guest shuts itself down after 128th reboot)
[0.12.1.2-2.497.el6]
- kvm-vmstate-fix-breakage-by-7e72abc382b700a72549e8147bde.patch [bz#1294941]
- Resolves: bz#1294941 (QEMU crash on snapshot revert when using Cirrus)
[0.12.1.2-2.496.el6]
- kvm-virtio-blk-Release-s-rq-queue-at-system_reset.patch [bz#1361490]
- kvm-virtio-scsi-Prevent-assertion-on-missed-events.patch [bz#1333697]
- Resolves: bz#1333697 (qemu-kvm: /builddir/build/BUILD/qemu-kvm-0.12.1.2/hw/virtio-scsi.c:724: virtio_scsi_push_event: Assertion event == 0 failed)
- Resolves: bz#1361490 (system_reset should clear pending request for error (virtio-blk))
[0.12.1.2-2.495.el6]
- kvm-qemu-img-add-support-for-fully-allocated-images.patch [bz#1297653]
- kvm-qemu-img-fix-usage-instruction-for-qemu-img-convert.patch [bz#1297653]
- kvm-target-i386-warns-users-when-CPU-threads-1-for-non-I.patch [bz#1292678 bz#1320066]
- Resolves: bz#1292678 (Qemu should report error when cmdline set threads=2 in amd host)
- Resolves: bz#1297653 (qemu-img convert cant create a fully allocated image passed a -S 0 option)
- Resolves: bz#1320066 (Qemu should not report error when cmdline set threads=2 in Intel host)
[0.12.1.2-2.494.el6]
- kvm-rtl8139-flush-queued-packets-when-RxBufPtr-is-writte.patch [bz#1356924]
- kvm-block-Detect-unaligned-length-in-bdrv_qiov_is_aligne.patch [bz#1321862]
- kvm-ide-fix-halted-IO-segfault-at-reset.patch [bz#1281713]
- kvm-atapi-fix-halted-DMA-reset.patch [bz#1281713]
- Resolves: bz#1281713 (system_reset should clear pending request for error (IDE))
- Resolves: bz#1321862 (Backport 'block: Detect unaligned length in bdrv_qiov_is_aligned()')
- Resolves: bz#1356924 (rtl8139 driver hangs in widows guests)
[0.12.1.2-2.493.el6]
- kvm-virtio-error-out-if-guest-exceeds-virtqueue-size.patch [bz#1359725]
- Resolves: bz#1359725 (CVE-2016-5403 qemu-kvm: Qemu: virtio: unbounded memory allocation on host via guest leading to DoS [rhel-6.9])
[0.12.1.2-2.492.el6]
- kvm-Add-vga.h-unmodified-from-Linux.patch [bz#1331408]
- kvm-vga.h-remove-unused-stuff-and-reformat.patch [bz#1331408]
- kvm-vga-use-constants-from-vga.h.patch [bz#1331408]
- kvm-vga-Remove-some-should-be-done-in-BIOS-comments.patch [bz#1331408]
- kvm-vga-fix-banked-access-bounds-checking-CVE-2016-3710.patch [bz#1331408]
- kvm-vga-add-vbe_enabled-helper.patch [bz#1331408]
- kvm-vga-factor-out-vga-register-setup.patch [bz#1331408]
- kvm-vga-update-vga-register-setup-on-vbe-changes.patch [bz#1331408]
- kvm-vga-make-sure-vga-register-setup-for-vbe-stays-intac.patch [bz#1331408]
- kvm-vga-add-sr_vbe-register-set.patch [bz#1331408 bz#1346981]
- Resolves: bz#1331408 (CVE-2016-3710 qemu-kvm: qemu: incorrect banked access bounds checking in vga module [rhel-6.9])
- Resolves: bz#1346981 (Regression from CVE-2016-3712: windows installer fails to start)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
qemu-guest-agent
0.12.1.2-2.503.el6
qemu-img
0.12.1.2-2.503.el6
qemu-kvm
0.12.1.2-2.503.el6
qemu-kvm-tools
0.12.1.2-2.503.el6
Oracle Linux i686
qemu-guest-agent
0.12.1.2-2.503.el6
Связанные CVE
Связанные уязвимости
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.
Integer overflow in the VGA module in QEMU allows local guest OS users ...
Integer overflow in the VGA module in QEMU allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) by editing VGA registers in VBE mode.