[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247974

 
 

909

 
 

194654

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2018:0816-01 -- Redhat qemu-kvm

ID: oval:org.secpod.oval:def:502272Date: (C)2018-04-13   (M)2024-01-29
Class: PATCHFamily: unix




Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix: * Qemu: vga: OOB read access during display update * Qemu: Slirp: use-after-free when sending response * Qemu: memory exhaustion through framebuffer update request message in VNC server * Qemu: I/O: potential memory exhaustion via websock connection to VNC * Qemu: Out-of-bounds read in vga_draw_text routine For more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section. Red Hat would like to thank David Buchanan for reporting CVE-2017-13672; Wjjzhang for reporting CVE-2017-13711; and Jiang Xin and Lin ZheCheng for reporting CVE-2018-5683. The CVE-2017-15124 issue was discovered by Daniel Berrange . Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.5 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 7
Product:
qemu-kvm
qemu-img
Reference:
RHSA-2018:0816-01
CVE-2017-13672
CVE-2017-13711
CVE-2017-15124
CVE-2017-15268
CVE-2018-5683
CVE    5
CVE-2017-13711
CVE-2017-15268
CVE-2017-15124
CVE-2017-13672
...
CPE    2
cpe:/a:kvm_group:qemu-kvm
cpe:/o:redhat:enterprise_linux:7

© SecPod Technologies