Описание
ELSA-2020-0366: qemu-kvm security, bug fix, and enhancement update (IMPORTANT)
[1.5.3-167.el7_7.4]
- kvm-target-i386-add-MDS-NO-feature.patch [bz#1755333]
- Resolves: bz#1755333 ([Intel 7.8 FEAT] MDS_NO exposure to guest - qemu-kvm [rhel-7.7.z])
[1.5.3-167.el7_7.3]
- kvm-target-i386-Export-TAA_NO-bit-to-guests.patch [bz#1771960]
- kvm-target-i386-add-support-for-MSR_IA32_TSX_CTRL.patch [bz#1771960]
- Resolves: bz#1771960 (CVE-2019-11135 qemu-kvm: hw: TSX Transaction Asynchronous Abort (TAA) [rhel-7.7.z])
[1.5.3-167.el7_7.2]
- kvm-target-i386-Merge-feature-filtering-checking-functio.patch [bz#1730606]
- kvm-target-i386-Isolate-KVM-specific-code-on-CPU-feature.patch [bz#1730606]
- kvm-i386-Add-new-MSR-indices-for-IA32_PRED_CMD-and-IA32_.patch [bz#1730606]
- kvm-i386-Add-CPUID-bit-and-feature-words-for-IA32_ARCH_C.patch [bz#1730606]
- kvm-Add-support-to-KVM_GET_MSR_FEATURE_INDEX_LIST-an.patch [bz#1730606]
- kvm-x86-Data-structure-changes-to-support-MSR-based-feat.patch [bz#1730606]
- kvm-x86-define-a-new-MSR-based-feature-word-FEATURE_WORD.patch [bz#1730606]
- kvm-Use-KVM_GET_MSR_INDEX_LIST-for-MSR_IA32_ARCH_CAP.patch [bz#1730606]
- kvm-i386-kvm-Disable-arch_capabilities-if-MSR-can-t-be-s.patch [bz#1730606]
- kvm-Remove-arch-capabilities-deprecation.patch [bz#1730606]
- Resolves: bz#1730606 ([Intel 7.8 Bug] [KVM][CLX] CPUID_7_0_EDX_ARCH_CAPABILITIES is not enabled in VM qemu-kvm [rhel-7.7.z])
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
qemu-img
1.5.3-167.el7_7.4
qemu-kvm
1.5.3-167.el7_7.4
qemu-kvm-common
1.5.3-167.el7_7.4
qemu-kvm-tools
1.5.3-167.el7_7.4
Связанные CVE
Связанные уязвимости
CVSS3: 8.8
ubuntu
почти 6 лет назад
ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
CVSS3: 7
redhat
почти 6 лет назад
ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
CVSS3: 8.8
nvd
почти 6 лет назад
ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.