Описание
ELSA-2018-2462: qemu-kvm security and bug fix update (IMPORTANT)
[1.5.3-156.el7_5.5]
- kvm-multiboot-bss_end_addr-can-be-zero.patch [bz#1549824]
- kvm-multiboot-Remove-unused-variables-from-multiboot.c.patch [bz#1549824]
- kvm-multiboot-Use-header-names-when-displaying-fields.patch [bz#1549824]
- kvm-multiboot-fprintf-stderr.-error_report.patch [bz#1549824]
- kvm-multiboot-Reject-kernels-exceeding-the-address-space.patch [bz#1549824]
- kvm-multiboot-Check-validity-of-mh_header_addr.patch [bz#1549824]
- kvm-slirp-remove-mbuf-m_hdr-m_dat-indirection.patch [bz#1586248]
- kvm-slirp-correct-size-computation-while-concatenating-m.patch [bz#1586248]
- Resolves: bz#1549824 (CVE-2018-7550 qemu-kvm: Qemu: i386: multiboot OOB access while loading kernel image [rhel-7.5.z])
- Resolves: bz#1586248 (CVE-2018-11806 qemu-kvm: QEMU: slirp: heap buffer overflow while reassembling fragmented datagrams [rhel-7.5.z])
[1.5.3-156.el7_5.4]
- kvm-target-i386-introduce-kvm_put_one_msr.patch [bz#1596302]
- kvm-apic-fix-2.2-2.1-migration.patch [bz#1596302]
- kvm-x86-lapic-Load-LAPIC-state-at-post_load.patch [bz#1596302]
- kvm-apic-drop-debugging.patch [bz#1596302]
- kvm-apic-set-APIC-base-as-part-of-kvm_apic_put.patch [bz#1596302]
- Resolves: bz#1596302 (Windows 2012 Guest hangs after live migration with RTC clock stopped. [rhel-7.5.z])
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
qemu-img
1.5.3-156.el7_5.5
qemu-kvm
1.5.3-156.el7_5.5
qemu-kvm-common
1.5.3-156.el7_5.5
qemu-kvm-tools
1.5.3-156.el7_5.5
Связанные CVE
Связанные уязвимости
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.
The load_multiboot function in hw/i386/multiboot.c in Quick Emulator (aka QEMU) allows local guest OS users to execute arbitrary code on the QEMU host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access.