Lucene search

K
oraclelinuxOracleLinuxELSA-2017-1856
HistoryAug 07, 2017 - 12:00 a.m.

qemu-kvm security, bug fix, and enhancement update

2017-08-0700:00:00
linux.oracle.com
12

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.026 Low

EPSS

Percentile

89.1%

[1.5.3-141.el7]

  • kvm-Fix-memory-slot-page-alignment-logic-bug-1455745.patch [bz#1455745]
  • kvm-Do-not-hang-on-full-PTY.patch [bz#1452067]
  • kvm-serial-fixing-vmstate-for-save-restore.patch [bz#1452067]
  • kvm-serial-reinstate-watch-after-migration.patch [bz#1452067]
  • kvm-nbd-Fully-initialize-client-in-case-of-failed-negoti.patch [bz#1451614]
  • kvm-nbd-Fix-regression-on-resiliency-to-port-scan.patch [bz#1451614]
  • Resolves: bz#1451614
    (CVE-2017-9524 qemu-kvm: segment fault when private user nmap qemu-nbd server [rhel-7.4])
  • Resolves: bz#1452067
    (migration can confuse serial port user)
  • Resolves: bz#1455745
    (Backport fix for broken logic thats supposed to ensure memory slots are page aligned)
    [1.5.3-140.el7]
  • kvm-spice-fix-spice_chr_add_watch-pre-condition.patch [bz#1456983]
  • Resolves: bz#1456983
    (Character device regression due to missing patch)
    [1.5.3-139.el7]
  • kvm-char-change-qemu_chr_fe_add_watch-to-return-unsigned.patch [bz#1451470]
  • Resolves: bz#1451470
    (RHEL 7.2 based VM (Virtual Machine) hung for several hours apparently waiting for lock held by main_loop)
    [1.5.3-138.el7]
  • kvm-char-serial-cosmetic-fixes.patch [bz#1451470]
  • kvm-char-serial-Use-generic-Fifo8.patch [bz#1451470]
  • kvm-char-serial-serial_ioport_write-Factor-out-common-co.patch [bz#1451470]
  • kvm-char-serial-fix-copy-paste-error-fifo8_is_full-vs-em.patch [bz#1451470]
  • kvm-char-serial-Fix-emptyness-check.patch [bz#1451470]
  • kvm-char-serial-Fix-emptyness-handling.patch [bz#1451470]
  • kvm-serial-poll-the-serial-console-with-G_IO_HUP.patch [bz#1451470]
  • kvm-serial-change-retry-logic-to-avoid-concurrency.patch [bz#1451470]
  • kvm-qemu-char-ignore-flow-control-if-a-PTY-s-slave-is-no.patch [bz#1451470]
  • kvm-serial-check-if-backed-by-a-physical-serial-port-at-.patch [bz#1451470]
  • kvm-serial-reset-thri_pending-on-IER-writes-with-THRI-0.patch [bz#1451470]
  • kvm-serial-clean-up-THRE-TEMT-handling.patch [bz#1451470]
  • kvm-serial-update-LSR-on-enabling-disabling-FIFOs.patch [bz#1451470]
  • kvm-serial-only-resample-THR-interrupt-on-rising-edge-of.patch [bz#1451470]
  • kvm-serial-make-tsr_retry-unsigned.patch [bz#1451470]
  • kvm-serial-simplify-tsr_retry-reset.patch [bz#1451470]
  • kvm-serial-separate-serial_xmit-and-serial_watch_cb.patch [bz#1451470]
  • kvm-serial-remove-watch-on-reset.patch [bz#1451470]
  • Resolves: bz#1451470
    (RHEL 7.2 based VM (Virtual Machine) hung for several hours apparently waiting for lock held by main_loop)
    [1.5.3-137.el7]
  • kvm-ide-fix-halted-IO-segfault-at-reset.patch [bz#1299875]
  • Resolves: bz#1299875
    (system_reset should clear pending request for error (IDE))
    [1.5.3-136.el7]
  • kvm-target-i386-get-set-migrate-XSAVES-state.patch [bz#1327593]
  • kvm-Removing-texi2html-from-build-requirements.patch [bz#1440987]
  • kvm-Disable-build-of-32bit-packages.patch [bz#1441778]
  • kvm-Add-sample-images-to-srpm.patch [bz#1436280]
  • Resolves: bz#1327593
    ([Intel 7.4 FEAT] KVM Enable the XSAVEC, XSAVES and XRSTORS instructions)
  • Resolves: bz#1436280
    (sample images for qemu-iotests are missing in the SRPM)
  • Resolves: bz#1440987
    (Remove texi2html build dependancy from RPM)
  • Resolves: bz#1441778
    (Stop building qemu-img for 32bit architectures.)
    [1.5.3-135.el7]
  • kvm-fix-cirrus_vga-fix-OOB-read-case-qemu-Segmentation-f.patch [bz#1430060]
  • kvm-cirrus-vnc-zap-bitblit-support-from-console-code.patch [bz#1430060]
  • kvm-cirrus-add-option-to-disable-blitter.patch [bz#1430060]
  • kvm-cirrus-fix-cirrus_invalidate_region.patch [bz#1430060]
  • kvm-cirrus-stop-passing-around-dst-pointers-in-the-blitt.patch [bz#1430060]
  • kvm-cirrus-stop-passing-around-src-pointers-in-the-blitt.patch [bz#1430060]
  • kvm-cirrus-fix-off-by-one-in-cirrus_bitblt_rop_bkwd_tran.patch [bz#1430060]
  • Resolves: bz#1430060
    (CVE-2016-9603 qemu-kvm: Qemu: cirrus: heap buffer overflow via vnc connection [rhel-7.4])
    [1.5.3-134.el7]
  • kvm-ui-vnc-introduce-VNC_DIRTY_PIXELS_PER_BIT-macro.patch [bz#1377977]
  • kvm-ui-vnc-derive-cmp_bytes-from-VNC_DIRTY_PIXELS_PER_BI.patch [bz#1377977]
  • kvm-ui-vnc-optimize-dirty-bitmap-tracking.patch [bz#1377977]
  • kvm-ui-vnc-optimize-setting-in-vnc_dpy_update.patch [bz#1377977]
  • kvm-ui-vnc-fix-vmware-VGA-incompatiblities.patch [bz#1377977]
  • kvm-ui-vnc-fix-potential-memory-corruption-issues.patch [bz#1377977]
  • kvm-vnc-fix-memory-corruption-CVE-2015-5225.patch [bz#1377977]
  • kvm-vnc-fix-overflow-in-vnc_update_stats.patch [bz#1377977]
  • kvm-i386-kvmvapic-initialise-imm32-variable.patch [bz#1335751]
  • kvm-qemu-iotests-Filter-out-actual-image-size-in-067.patch [bz#1427176]
  • vm-qcow2-Don-t-rely-on-free_cluster_index-in-alloc_ref2.patch [bz#1427176]
  • kvm-qemu-iotests-Fix-core-dump-suppression-in-test-039.patch [bz#1427176]
  • kvm-qemu-io-Add-sigraise-command.patch [bz#1427176]
  • kvm-iotests-Filter-for-Killed-in-qemu-io-output.patch [bz#1427176]
  • kvm-iotests-Fix-test-039.patch [bz#1427176]
  • kvm-blkdebug-Add-bdrv_truncate.patch [bz#1427176]
  • kvm-vhdx-Fix-zero-fill-iov-length.patch [bz#1427176]
  • kvm-qemu-iotests-Disable-030-040-041.patch [bz#1427176]
  • kvm-x86-add-AVX512_VPOPCNTDQ-features.patch [bz#1415830]
  • kvm-usb-ccid-check-ccid-apdu-length.patch [bz#1419818]
  • kvm-usb-ccid-better-bulk_out-error-handling.patch [bz#1419818]
  • kvm-usb-ccid-move-header-size-check.patch [bz#1419818]
  • kvm-usb-ccid-add-check-message-size-checks.patch [bz#1419818]
  • kvm-spec-Update-rdma-build-dependency.patch [bz#1433920]
  • Resolves: bz#1335751
    (CVE-2016-4020 qemu-kvm: Qemu: i386: leakage of stack memory to guest in kvmvapic.c [rhel-7.4])
  • Resolves: bz#1377977
    (qemu-kvm coredump in vnc_raw_send_framebuffer_update [rhel-7.4])
  • Resolves: bz#1415830
    ([Intel 7.4 FEAT] Enable vpopcntdq for KNM - qemu/kvm)
  • Resolves: bz#1419818
    (CVE-2017-5898 qemu-kvm: Qemu: usb: integer overflow in emulated_apdu_from_guest [rhel-7.4])
  • Resolves: bz#1427176
    (test cases of qemu-iotests failed)
  • Resolves: bz#1433920
    (Switch from librdmacm-devel to rdma-core-devel)
    [1.5.3-133.el7]
  • kvm-target-i386-add-Ivy-Bridge-CPU-model.patch [bz#1368375]
  • kvm-x86-add-AVX512_4VNNIW-and-AVX512_4FMAPS-features.patch [bz#1382122]
  • kvm-target-i386-kvm_cpu_fill_host-Kill-unused-code.patch [bz#1382122]
  • kvm-target-i386-kvm_cpu_fill_host-No-need-to-check-level.patch [bz#1382122]
  • kvm-target-i386-kvm_cpu_fill_host-No-need-to-check-CPU-v.patch [bz#1382122]
  • kvm-target-i386-kvm_cpu_fill_host-No-need-to-check-xleve.patch [bz#1382122]
  • kvm-target-i386-kvm_cpu_fill_host-Set-all-feature-words-.patch [bz#1382122]
  • kvm-target-i386-kvm_cpu_fill_host-Fill-feature-words-in-.patch [bz#1382122]
  • kvm-target-i386-kvm_check_features_against_host-Kill-fea.patch [bz#1382122]
  • kvm-target-i386-Make-TCG-feature-filtering-more-readable.patch [bz#1382122]
  • kvm-target-i386-Filter-FEAT_7_0_EBX-TCG-features-too.patch [bz#1382122]
  • kvm-target-i386-Filter-KVM-and-0xC0000001-features-on-TC.patch [bz#1382122]
  • kvm-target-i386-Define-TCG_-_FEATURES-earlier-in-cpu.c.patch [bz#1382122]
  • kvm-target-i386-Loop-based-copying-and-setting-unsetting.patch [bz#1382122]
  • kvm-target-i386-Loop-based-feature-word-filtering-in-TCG.patch [bz#1382122]
  • kvm-spice-remove-spice-experimental.h-include.patch [bz#1430606]
  • kvm-spice-replace-use-of-deprecated-API.patch [bz#1430606]
  • Resolves: bz#1368375
    ([Intel 7.4 Bug] qemu-kvm does not support ‘-cpu IvyBridge’)
  • Resolves: bz#1382122
    ([Intel 7.4 FEAT] KVM Enable the avx512_4vnniw, avx512_4fmaps instructions in qemu)
  • Resolves: bz#1430606
    (Cant build qemu-kvm with newer spice packages)
    [1.5.3-132.el7]
  • kvm-cirrus-fix-patterncopy-checks.patch [bz#1420492]
  • kvm-Revert-cirrus-allow-zero-source-pitch-in-pattern-fil.patch [bz#1420492]
  • kvm-cirrus-add-blit_is_unsafe-call-to-cirrus_bitblt_cput.patch [bz#1420492]
  • Resolves: bz#1420492
    (EMBARGOED CVE-2017-2620 qemu-kvm: Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo [rhel-7.4])
    [1.5.3-131.el7]
  • kvm-memory-Allow-access-only-upto-the-maximum-alignment-.patch [bz#1342768]
  • kvm-virtio-blk-Release-s-rq-queue-at-system_reset.patch [bz#1361488]
  • kvm-cirrus_vga-fix-off-by-one-in-blit_region_is_unsafe.patch [bz#1418233]
  • kvm-display-cirrus-check-vga-bits-per-pixel-bpp-value.patch [bz#1418233]
  • kvm-display-cirrus-ignore-source-pitch-value-as-needed-i.patch [bz#1418233]
  • kvm-cirrus-handle-negative-pitch-in-cirrus_invalidate_re.patch [bz#1418233]
  • kvm-cirrus-allow-zero-source-pitch-in-pattern-fill-rops.patch [bz#1418233]
  • kvm-cirrus-fix-blit-address-mask-handling.patch [bz#1418233]
  • kvm-cirrus-fix-oob-access-issue-CVE-2017-2615.patch [bz#1418233]
  • kvm-HMP-Fix-user-manual-typo-of-__com.redhat_qxl_screend.patch [bz#1419898]
  • kvm-HMP-Fix-documentation-of-__com.redhat.drive_add.patch [bz#1419898]
  • Resolves: bz#1342768
    ([Intel 7.4 Bug] qemu-kvm crashes with Linux kernel 4.6.0 or above)
  • Resolves: bz#1361488
    (system_reset should clear pending request for error (virtio-blk))
  • Resolves: bz#1418233
    (CVE-2017-2615 qemu-kvm: Qemu: display: cirrus: oob access while doing bitblt copy backward mode [rhel-7.4])
  • Resolves: bz#1419898
    (Documentation inaccurate for __com.redhat_qxl_screendump and __com.redhat_drive_add)
    [1.5.3-130.el7]
  • kvm-gluster-correctly-propagate-errors.patch [bz#1151859]
  • kvm-gluster-Correctly-propagate-errors-when-volume-isn-t.patch [bz#1151859]
  • kvm-block-gluster-add-support-for-selecting-debug-loggin.patch [bz#1151859]
  • Resolves: bz#1151859
    ([RFE] Allow the libgfapi logging level to be controlled.)
    [1.5.3-129.el7]
  • kvm-Update-qemu-kvm-package-Summary-and-Description.patch [bz#1378541]
  • kvm-vl-Don-t-silently-change-topology-when-all-smp-optio.patch [bz#1375507]
  • kvm-net-check-packet-payload-length.patch [bz#1398218]
  • kvm-qxl-Only-emit-QXL_INTERRUPT_CLIENT_MONITORS_CONFIG-o.patch [bz#1342489]
  • Resolves: bz#1342489
    (Flickering Fedora 24 Login Screen on RHEL 7)
  • Resolves: bz#1375507
    (‘threads’ option is overwritten if both ‘sockets’ and ‘cores’ is set on -smp)
  • Resolves: bz#1378541
    (QEMU: update package summary and description)
  • Resolves: bz#1398218
    (CVE-2016-2857 qemu-kvm: Qemu: net: out of bounds read in net_checksum_calculate() [rhel-7.4])
    [1.5.3-128.el7]
  • kvm-virtio-introduce-virtqueue_unmap_sg.patch [bz#1377968]
  • kvm-virtio-introduce-virtqueue_discard.patch [bz#1377968]
  • kvm-virtio-decrement-vq-inuse-in-virtqueue_discard.patch [bz#1377968]
  • kvm-balloon-fix-segfault-and-harden-the-stats-queue.patch [bz#1377968]
  • kvm-virtio-balloon-discard-virtqueue-element-on-reset.patch [bz#1377968]
  • kvm-virtio-zero-vq-inuse-in-virtio_reset.patch [bz#1377968]
  • kvm-virtio-add-virtqueue_rewind.patch [bz#1377968]
  • kvm-virtio-balloon-fix-stats-vq-migration.patch [bz#1377968]
  • Resolves: bz#1377968
    ([RHEL7.3] KVM guest shuts itself down after 128th reboot)
    [1.5.3-127.el7]
  • kvm-hw-i386-regenerate-checked-in-AML-payload-RHEL-only.patch [bz#1377087]
  • kvm-ide-fix-halted-IO-segfault-at-reset.patch [bz#1377087]
  • Resolves: bz#1377087
    (shutdown rhel 5.11 guest failed and stop at ‘system halted’)

9.9 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

9 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

0.026 Low

EPSS

Percentile

89.1%