{"id":"RHSA-2017:1206","summary":"Red Hat Security Advisory: qemu-kvm security update","modified":"2026-02-20T10:01:41Z","published":"2024-09-15T23:56:11Z","upstream":["CVE-2016-9603","CVE-2017-2633","CVE-2017-7718","CVE-2017-7980"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:1206"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1400438"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1425939"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1430056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1437060"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1443441"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1444371"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2017/rhsa-2017_1206.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2016-9603"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2016-9603"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2016-9603"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-2633"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-2633"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-2633"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-7718"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-7718"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7718"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2017-7980"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2017-7980"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2017-7980"}],"affected":[{"package":{"name":"qemu-guest-agent","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/qemu-guest-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-img","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/qemu-img"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/qemu-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/qemu-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm-tools","ecosystem":"Red Hat:enterprise_linux:6::client","purl":"pkg:rpm/redhat/qemu-kvm-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-guest-agent","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/qemu-guest-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-img","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/qemu-img"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/qemu-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/qemu-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm-tools","ecosystem":"Red Hat:enterprise_linux:6::computenode","purl":"pkg:rpm/redhat/qemu-kvm-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-guest-agent","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/qemu-guest-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-img","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/qemu-img"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/qemu-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/qemu-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm-tools","ecosystem":"Red Hat:enterprise_linux:6::server","purl":"pkg:rpm/redhat/qemu-kvm-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-guest-agent","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/qemu-guest-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-img","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/qemu-img"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/qemu-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm-debuginfo","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/qemu-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}},{"package":{"name":"qemu-kvm-tools","ecosystem":"Red Hat:enterprise_linux:6::workstation","purl":"pkg:rpm/redhat/qemu-kvm-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2:0.12.1.2-2.503.el6_9.3"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2017:1206.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L"}]}