Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2017-3368

Опубликовано: 30 нояб. 2017
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2017-3368: qemu-kvm security update (MODERATE)

[1.5.3-141.el7_4.4]

  • kvm-multiboot-validate-multiboot-header-address-values.patch [bz#1501120]
  • Resolves: bz#1501120 (CVE-2017-14167 qemu-kvm: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.4.z])

[1.5.3-141.el7_4.3]

  • kvm-bswap.h-Remove-cpu_to_32wu.patch [bz#1501294]
  • kvm-hw-use-ld_p-st_p-instead-of-ld_raw-st_raw.patch [bz#1501294]
  • kvm-vga-Start-cutting-out-non-32bpp-conversion-support.patch [bz#1501294]
  • kvm-vga-Remove-remainder-of-old-conversion-cruft.patch [bz#1501294]
  • kvm-vga-Separate-LE-and-BE-conversion-functions.patch [bz#1501294]
  • kvm-vga-Rename-vga_template.h-to-vga-helpers.h.patch [bz#1501294]
  • kvm-vga-stop-passing-pointers-to-vga_draw_line-functions.patch [bz#1501294]
  • kvm-vga-drop-line_offset-variable.patch [bz#1501294]
  • kvm-vga-Add-mechanism-to-force-the-use-of-a-shadow-surfa.patch [bz#1501294]
  • kvm-vga-handle-cirrus-vbe-mode-wraparounds.patch [bz#1501294]
  • kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.patch [bz#1501294]
  • Resolves: bz#1501294 (CVE-2017-15289 qemu-kvm: Qemu: cirrus: OOB access issue in mode4and5 write functions [rhel-7.4.z])

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

qemu-img

1.5.3-141.el7_4.4

qemu-kvm

1.5.3-141.el7_4.4

qemu-kvm-common

1.5.3-141.el7_4.4

qemu-kvm-tools

1.5.3-141.el7_4.4

Связанные CVE

Связанные уязвимости

suse-cvrf
больше 7 лет назад

Security update for qemu

suse-cvrf
больше 7 лет назад

Security update for qemu

suse-cvrf
больше 7 лет назад

Security update for qemu

suse-cvrf
больше 7 лет назад

Security update for qemu

CVSS3: 8.8
ubuntu
почти 8 лет назад

Integer overflow in the load_multiboot function in hw/i386/multiboot.c in QEMU (aka Quick Emulator) allows local guest OS users to execute arbitrary code on the host via crafted multiboot header address values, which trigger an out-of-bounds write.

Уязвимость ELSA-2017-3368