Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-2462

Опубликовано: 16 авг. 2018
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2018-2462: qemu-kvm security and bug fix update (IMPORTANT)

[1.5.3-156.el7_5.5]

  • kvm-multiboot-bss_end_addr-can-be-zero.patch [bz#1549824]
  • kvm-multiboot-Remove-unused-variables-from-multiboot.c.patch [bz#1549824]
  • kvm-multiboot-Use-header-names-when-displaying-fields.patch [bz#1549824]
  • kvm-multiboot-fprintf-stderr.-error_report.patch [bz#1549824]
  • kvm-multiboot-Reject-kernels-exceeding-the-address-space.patch [bz#1549824]
  • kvm-multiboot-Check-validity-of-mh_header_addr.patch [bz#1549824]
  • kvm-slirp-remove-mbuf-m_hdr-m_dat-indirection.patch [bz#1586248]
  • kvm-slirp-correct-size-computation-while-concatenating-m.patch [bz#1586248]
  • Resolves: bz#1549824 (CVE-2018-7550 qemu-kvm: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.5.z])
  • Resolves: bz#1586248 (CVE-2018-11806 qemu-kvm: QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams [rhel-7.5.z])

[1.5.3-156.el7_5.4]

  • kvm-target-i386-introduce-kvm_put_one_msr.patch [bz#1596302]
  • kvm-apic-fix-2.2-2.1-migration.patch [bz#1596302]
  • kvm-x86-lapic-Load-LAPIC-state-at-post_load.patch [bz#1596302]
  • kvm-apic-drop-debugging.patch [bz#1596302]
  • kvm-apic-set-APIC-base-as-part-of-kvm_apic_put.patch [bz#1596302]
  • Resolves: bz#1596302 (Windows 2012 Guest hangs after live migration with RTC clock stopped. [rhel-7.5.z])

Обновленные пакеты

Oracle Linux 7

Oracle Linux x86_64

qemu-img

1.5.3-156.el7_5.5

qemu-kvm

1.5.3-156.el7_5.5

qemu-kvm-common

1.5.3-156.el7_5.5

qemu-kvm-tools

1.5.3-156.el7_5.5

Связанные CVE

Связанные уязвимости

suse-cvrf
почти 7 лет назад

Security update for qemu

suse-cvrf
почти 7 лет назад

Security update for qemu

CVSS3: 8.8
ubuntu
больше 7 лет назад

The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.

CVSS3: 7.8
redhat
больше 7 лет назад

The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.

CVSS3: 8.8
nvd
больше 7 лет назад

The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.