Описание
ELSA-2019-4520: qemu security update (IMPORTANT)
[12:2.9.0-19.el7]
- lsi53c895a: convert to trace-events (Mark Cave-Ayland) [Orabug: 28205376]
- lsi: Reselection needed to remove pending commands from queue (George Kennedy) [Orabug: 28626490]
- lsi53c895a: check message length value is valid (Prasad J Pandit) [Orabug: 28873208] {CVE-2018-18849}
- 9p: fix QEMU crash when renaming files (Greg Kurz) [Orabug: 28971701] {CVE-2018-19489}
- 9p: take write lock on fid path updates (CVE-2018-19364) (Greg Kurz) [Orabug: 28949917] {CVE-2018-19364}
- nvme: fix out-of-bounds access to the CMB (Paolo Bonzini) [Orabug: 28885514] {CVE-2018-16847}
- x86/cpu: Enable CLDEMOTE(Demote Cache Line) cpu feature (Jingqi Liu) [Orabug: 28985301]
- i386: Define AMD's no SSB mitigation needed. (Konrad Rzeszutek Wilk) [Orabug: 28951578]
- i386: define the AMD 'amd-ssbd' CPUID feature bit (Konrad Rzeszutek Wilk) [Orabug: 28951578]
- vfio-pci: emit FAILOVER_PRIMARY_CHANGED event on guest behalf when unrealized (Si-Wei Liu) [Orabug: 28897545]
- hw/i386: Fix IVHD entry length for AMD IOMMU (Jan Kiszka) [Orabug: 28891184]
- kvm: x86: Fix kvm_arch_fixup_msi_route for remap-less case (Jan Kiszka) [Orabug: 28891188]
- i386: Add new model of Cascadelake-Server (Tao Xu) [Orabug: 28886306]
- i386: Add Intel Processor Trace feature support (Chao Peng) [Orabug: 28886306]
- i386: Add PKU on Skylake-Server CPU model (Tao Xu)
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
qemu
2.9.0-19.el7
qemu-block-gluster
2.9.0-19.el7
qemu-block-iscsi
2.9.0-19.el7
qemu-block-rbd
2.9.0-19.el7
qemu-common
2.9.0-19.el7
qemu-img
2.9.0-19.el7
qemu-kvm
2.9.0-19.el7
qemu-kvm-core
2.9.0-19.el7
qemu-system-x86
2.9.0-19.el7
qemu-system-x86-core
2.9.0-19.el7
Связанные уязвимости
An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
An OOB heap buffer r/w access issue was found in the NVM Express Controller emulation in QEMU. It could occur in nvme_cmb_ops routines in nvme device. A guest user/process could use this flaw to crash the QEMU process resulting in DoS or potentially run arbitrary code with privileges of the QEMU process.
An OOB heap buffer r/w access issue was found in the NVM Express Contr ...