Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-2162

Опубликовано: 10 июл. 2018
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2018-2162: qemu-kvm security update (IMPORTANT)

[0.12.1.2-2.506.el6_10.1]

  • qemu-kvm-i386-define-the-ssbd-CPUID-feature-bit-CVE-2018-3639.patch [bz#1574074]
  • qemu-kvm-i386-Define-the-Virt-SSBD-MSR-and-handling-of-it-CVE.patch [bz#1574074]
  • qemu-kvm-i386-define-the-AMD-virt-ssbd-CPUID-feature-bit-CVE-.patch [bz#1574074]
  • Resolves: bz#1574074 (CVE-2018-3639 qemu-kvm: hw: cpu: speculative store bypass [rhel-6.10.z])

[0.12.1.2-2.506.el6]

  • kvm-vga-add-share_surface-flag.patch [bz#1553674]
  • kvm-vga-add-sanity-checks.patch [bz#1553674]
  • Resolves: bz#1553674 (CVE-2018-7858 qemu-kvm: Qemu: cirrus: OOB access when updating vga display [rhel-6])

[0.12.1.2-2.505.el6]

  • kvm-target-i386-add-support-for-SPEC_CTRL-MSR.patch [bz#1525939 bz#1528024]
  • kvm-target-i386-cpu-add-new-CPUID-bits-for-indirect-bran.patch [bz#1525939 bz#1528024]
  • kvm-target-i386-cpu-add-new-CPU-models-for-indirect-bran.patch [bz#1525939 bz#1528024]
  • kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.patch [bz#1501298]
  • kvm-vga-stop-passing-pointers-to-vga_draw_line-functions.patch [bz#1486641]
  • kvm-vga-check-the-validation-of-memory-addr-when-draw-te.patch [bz#1534692]
  • Resolves: bz#1486641 (CVE-2017-13672 qemu-kvm-rhev: Qemu: vga: OOB read access during display update [rhel-6.10])
  • Resolves: bz#1501298 (CVE-2017-15289 qemu-kvm: Qemu: cirrus: OOB access issue in mode4and5 write functions [rhel-6.10])
  • Resolves: bz#1525939 (CVE-2017-5715 qemu-kvm: hw: cpu: speculative execution branch target injection [rhel-6.10])
  • Resolves: bz#1528024 (CVE-2017-5715 qemu-kvm-rhev: hw: cpu: speculative execution branch target injection [rhel-6.10])
  • Resolves: bz#1534692 (CVE-2018-5683 qemu-kvm: Qemu: Out-of-bounds read in vga_draw_text routine [rhel-6.10])
  • Resolves: bz#1549152 (qemu-kvm-rhev: remove unused patch file [rhel-6.10])

[0.12.1.2-2.504.el6]

  • kvm-vnc-apply-display-size-limits.patch [bz#1430616 bz#1430617]
  • kvm-fix-cirrus_vga-fix-OOB-read-case-qemu-Segmentation-f.patch [bz#1443448 bz#1443450]
  • kvm-cirrus-vnc-zap-bitblit-support-from-console-code.patch [bz#1443448 bz#1443450 bz#1447542 bz#1447545]
  • kvm-cirrus-avoid-write-only-variables.patch [bz#1444378 bz#1444380]
  • kvm-cirrus-stop-passing-around-dst-pointers-in-the-blitt.patch [bz#1444378 bz#1444380]
  • kvm-cirrus-stop-passing-around-src-pointers-in-the-blitt.patch [bz#1444378 bz#1444380]
  • kvm-cirrus-fix-off-by-one-in-cirrus_bitblt_rop_bkwd_tran.patch [bz#1444378 bz#1444380]
  • kvm-cirrus-fix-PUTPIXEL-macro.patch [bz#1444378 bz#1444380]
  • Resolves: bz#1430616 (CVE-2017-2633 qemu-kvm: Qemu: VNC: memory corruption due to unchecked resolution limit [rhel-6.10])
  • Resolves: bz#1430617 (CVE-2017-2633 qemu-kvm-rhev: Qemu: VNC: memory corruption due to unchecked resolution limit [rhel-6.10])
  • Resolves: bz#1443448 (CVE-2017-7718 qemu-kvm: Qemu: display: cirrus: OOB read access issue [rhel-6.10])
  • Resolves: bz#1443450 (CVE-2017-7718 qemu-kvm-rhev: Qemu: display: cirrus: OOB read access issue [rhel-6.10])
  • Resolves: bz#1444378 (CVE-2017-7980 qemu-kvm: Qemu: display: cirrus: OOB r/w access issues in bitblt routines [rhel-6.10])
  • Resolves: bz#1444380 (CVE-2017-7980 qemu-kvm-rhev: Qemu: display: cirrus: OOB r/w access issues in bitblt routines [rhel-6.10])
  • Resolves: bz#1447542 (CVE-2016-9603 qemu-kvm: Qemu: cirrus: heap buffer overflow via vnc connection [rhel-6.10])
  • Resolves: bz#1447545 (CVE-2016-9603 qemu-kvm-rhev: Qemu: cirrus: heap buffer overflow via vnc connection [rhel-6.10])

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

qemu-guest-agent

0.12.1.2-2.506.el6_10.1

qemu-img

0.12.1.2-2.506.el6_10.1

qemu-kvm

0.12.1.2-2.506.el6_10.1

qemu-kvm-tools

0.12.1.2-2.506.el6_10.1

Oracle Linux i686

qemu-guest-agent

0.12.1.2-2.506.el6_10.1

Связанные уязвимости

oracle-oval
больше 6 лет назад

ELSA-2018-4289: qemu security update (IMPORTANT)

oracle-oval
больше 6 лет назад

ELSA-2018-4285: qemu security update (IMPORTANT)

suse-cvrf
больше 6 лет назад

Security update for qemu

CVSS3: 5.5
ubuntu
больше 7 лет назад

Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.

CVSS3: 5.5
redhat
больше 7 лет назад

Quick Emulator (aka QEMU), when built with the Cirrus CLGD 54xx VGA Emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds access and QEMU process crash) by leveraging incorrect region calculation when updating VGA display.