Lucene search

K
oraclelinuxOracleLinuxELSA-2017-0621
HistoryMar 27, 2017 - 12:00 a.m.

qemu-kvm security and bug fix update

2017-03-2700:00:00
linux.oracle.com
41

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

57.1%

[0.12.1.2-2.503.el6]

  • kvm-cirrus-fix-patterncopy-checks.patch [bz#1420487 bz#1420489]
  • kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420487 bz#1420489]
  • kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420487 bz#1420489]
  • Resolves: bz#1420487
    (EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-6.9])
  • Resolves: bz#1420489
    (EMBARGOED CVE-2017-2620 qemu-kvm-rhev: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-6.9])
    [0.12.1.2-2.502.el6]
  • kvm-cirrus_vga-fix-division-by-0-for-color-expansion-rop.patch [bz#1418231 bz#1419417]
  • kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1418231 bz#1419417]
  • kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418231 bz#1419417]
  • kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1418231 bz#1419417]
  • kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1418231 bz#1419417]
  • kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418231 bz#1419417]
  • kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418231 bz#1419417]
  • kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418231 bz#1419417]
  • Resolves: bz#1418231
    (CVE-2017-2615 qemu-kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-6.9])
  • Resolves: bz#1419417
    (CVE-2017-2615 qemu-kvm-rhev: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-6.9])
    [0.12.1.2-2.501.el6]
  • kvm-Revert-iotests-Use-_img_info.patch [bz#1405882]
  • kvm-Revert-block-commit-speed-is-an-optional-parameter.patch [bz#1405882]
  • kvm-Revert-iotests-Disable-086.patch [bz#1405882]
  • kvm-Revert-iotests-Fix-049-s-reference-output.patch [bz#1405882]
  • kvm-Revert-iotests-Fix-026-s-reference-output.patch [bz#1405882]
  • kvm-Revert-qcow2-Support-exact-L1-table-growth.patch [bz#1405882]
  • kvm-Revert-qcow2-Free-allocated-L2-cluster-on-error.patch [bz#1405882]
  • kvm-net-check-packet-payload-length.patch [bz#1398214]
  • Resolves: bz#1398214
    (CVE-2016-2857 qemu-kvm: Qemu: net: out of bounds read in net_checksum_calculate() [rhel-6.9])
  • Reverts: bz#1405882
    (test cases 026 030 049 086 and 095 of qemu-iotests fail for qcow2 with qemu-kvm-rhev-0.12.1.2-2.498.el6)
    [0.12.1.2-2.500.el6]
  • kvm-qcow2-Free-allocated-L2-cluster-on-error.patch [bz#1405882]
  • kvm-qcow2-Support-exact-L1-table-growth.patch [bz#1405882]
  • kvm-iotests-Fix-026-s-reference-output.patch [bz#1405882]
  • kvm-iotests-Fix-049-s-reference-output.patch [bz#1405882]
  • kvm-iotests-Disable-086.patch [bz#1405882]
  • kvm-block-commit-speed-is-an-optional-parameter.patch [bz#1405882]
  • kvm-iotests-Use-_img_info.patch [bz#1405882]
  • Resolves: bz#1405882
    (test cases 026 030 049 086 and 095 of qemu-iotests fail for qcow2 with qemu-kvm-rhev-0.12.1.2-2.498.el6)
    [0.12.1.2-2.499.el6]
  • kvm-rename-qemu_aio_context-to-match-upstream.patch [bz#876993]
  • kvm-block-stop-relying-on-io_flush-in-bdrv_drain_all.patch [bz#876993]
  • kvm-block-add-bdrv_drain.patch [bz#876993]
  • kvm-block-avoid-very-long-pauses-at-the-end-of-mirroring.patch [bz#876993]
  • Resolves: bz#876993
    (qemu-kvm: vms become non-responsive during migrate disk load from 2 domains to a 3ed)
    [0.12.1.2-2.498.el6]
  • kvm-virtio-introduce-virtqueue_unmap_sg.patch [bz#1392520]
  • kvm-virtio-introduce-virtqueue_discard.patch [bz#1392520]
  • kvm-virtio-decrement-vq-inuse-in-virtqueue_discard.patch [bz#1392520]
  • kvm-balloon-fix-segfault-and-harden-the-stats-queue.patch [bz#1392520]
  • kvm-virtio-balloon-discard-virtqueue-element-on-reset.patch [bz#1392520]
  • kvm-virtio-zero-vq-inuse-in-virtio_reset.patch [bz#1392520]
  • kvm-PATCH-1-4-e1000-pre-initialize-RAH-RAL-registers.patch [bz#1300626]
  • kvm-net-update-nic-info-during-device-reset.patch [bz#1300626]
  • kvm-net-e1000-update-network-information-when-macaddr-is.patch [bz#1300626]
  • kvm-net-rtl8139-update-network-information-when-macaddr-.patch [bz#1300626]
  • Resolves: bz#1300626
    (e1000/rtl8139: qemu mac address can not be changed via set the hardware address in guest)
  • Resolves: bz#1392520
    ([RHEL6.9] KVM guest shuts itself down after 128th reboot)
    [0.12.1.2-2.497.el6]
  • kvm-vmstate-fix-breakage-by-7e72abc382b700a72549e8147bde.patch [bz#1294941]
  • Resolves: bz#1294941
    (QEMU crash on snapshot revert when using Cirrus)
    [0.12.1.2-2.496.el6]
  • kvm-virtio-blk-Release-s-rq-queue-at-system_reset.patch [bz#1361490]
  • kvm-virtio-scsi-Prevent-assertion-on-missed-events.patch [bz#1333697]
  • Resolves: bz#1333697
    (qemu-kvm: /builddir/build/BUILD/qemu-kvm-0.12.1.2/hw/virtio-scsi.c:724: virtio_scsi_push_event: Assertion event == 0 failed)
  • Resolves: bz#1361490
    (system_reset should clear pending request for error (virtio-blk))
    [0.12.1.2-2.495.el6]
  • kvm-qemu-img-add-support-for-fully-allocated-images.patch [bz#1297653]
  • kvm-qemu-img-fix-usage-instruction-for-qemu-img-convert.patch [bz#1297653]
  • kvm-target-i386-warns-users-when-CPU-threads-1-for-non-I.patch [bz#1292678 bz#1320066]
  • Resolves: bz#1292678
    (Qemu should report error when cmdline set threads=2 in amd host)
  • Resolves: bz#1297653
    (qemu-img convert cant create a fully allocated image passed a -S 0 option)
  • Resolves: bz#1320066
    (Qemu should not report error when cmdline set threads=2 in Intel host)
    [0.12.1.2-2.494.el6]
  • kvm-rtl8139-flush-queued-packets-when-RxBufPtr-is-writte.patch [bz#1356924]
  • kvm-block-Detect-unaligned-length-in-bdrv_qiov_is_aligne.patch [bz#1321862]
  • kvm-ide-fix-halted-IO-segfault-at-reset.patch [bz#1281713]
  • kvm-atapi-fix-halted-DMA-reset.patch [bz#1281713]
  • Resolves: bz#1281713
    (system_reset should clear pending request for error (IDE))
  • Resolves: bz#1321862
    (Backport ‘block: Detect unaligned length in bdrv_qiov_is_aligned()’)
  • Resolves: bz#1356924
    (rtl8139 driver hangs in widows guests)
    [0.12.1.2-2.493.el6]
  • kvm-virtio-error-out-if-guest-exceeds-virtqueue-size.patch [bz#1359725]
  • Resolves: bz#1359725
    (CVE-2016-5403 qemu-kvm: Qemu: virtio: unbounded memory allocation on host via guest leading to DoS [rhel-6.9])
    [0.12.1.2-2.492.el6]
  • kvm-Add-vga.h-unmodified-from-Linux.patch [bz#1331408]
  • kvm-vga.h-remove-unused-stuff-and-reformat.patch [bz#1331408]
  • kvm-vga-use-constants-from-vga.h.patch [bz#1331408]
  • kvm-vga-Remove-some-should-be-done-in-BIOS-comments.patch [bz#1331408]
  • kvm-vga-fix-banked-access-bounds-checking-CVE-2016-3710.patch [bz#1331408]
  • kvm-vga-add-vbe_enabled-helper.patch [bz#1331408]
  • kvm-vga-factor-out-vga-register-setup.patch [bz#1331408]
  • kvm-vga-update-vga-register-setup-on-vbe-changes.patch [bz#1331408]
  • kvm-vga-make-sure-vga-register-setup-for-vbe-stays-intac.patch [bz#1331408]
  • kvm-vga-add-sr_vbe-register-set.patch [bz#1331408 bz#1346981]
  • Resolves: bz#1331408
    (CVE-2016-3710 qemu-kvm: qemu: incorrect banked access bounds checking in vga module [rhel-6.9])
  • Resolves: bz#1346981
    (Regression from CVE-2016-3712: windows installer fails to start)

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.002 Low

EPSS

Percentile

57.1%