Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0627

Опубликовано: 19 авг. 2010
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2010-0627: kvm security and bug fix update (IMPORTANT)

[kvm-83-164.0.1.el5_5.21]

  • Added kvm-add-oracle-workaround-for-libvirt-bug.patch
  • Added kvm-Introduce-oel-machine-type.patch

[kvm-83-164.el5_5.21]

  • kvm-Fix-segfault-in-mmio-subpage-handling-code.patch [bz#619412]
  • Resolves: bz#619412 (CVE-2010-2784 qemu: insufficient constraints checking in exec.c:subpage_register() [rhel-5.5.z])

[kvm-83-164.el5_5.20]

  • kvm-virtio-net-correct-packet-length-checks.patch [bz#610343]
  • Resolves: bz#610343 (Virtio: Transfer file caused guest in same vlan abnormally quit)

[kvm-83-164.el5_5.19]

  • kvm-qcow2-Fix-qemu-img-check-segfault-on-corrupted-image.patch [bz#610342]
  • kvm-qcow2-Don-t-try-to-check-tables-that-couldn-t-be-loa.patch [bz#610342]
  • kvm-qemu-img-check-Distinguish-different-kinds-of-errors.patch [bz#618206]
  • kvm-qcow2-Change-check-to-distinguish-error-cases.patch [bz#618206]
  • Resolves: bz#610342 ([kvm] segmentation fault when running qemu-img check on faulty image)
  • Resolves: bz#618206 ([kvm] qemu image check returns cluster errors when using virtIO block (thinly provisioned) during e_no_space events (along with EIO errors))

[kvm-83-164.el5_5.18]

  • kvm-New-slots-need-dirty-tracking-enabled-when-migrating.patch [bz#618205]
  • Resolves: bz#618205 (SPICE - race in KVM/Spice would cause migration to fail (slots are not registered properly?))

[kvm-83-164.el5_5.17]

  • kvm-kernel-KVM-MMU-fix-conflict-access-permissions-in-direct-sp.patch [bz#616796]
  • Resolves: bz#616796 (KVM uses wrong permissions for large guest pages)

[kvm-83-164.el5_5.16]

  • kvm-kernel-fix-null-pointer-dereference.patch [bz#570531]
    • Resolves: bz#570531
    • CVE: CVE-2010-0435
  • kvm-qemu-fix-unsafe-ring-handling.patch [bz#568816]
    • Resolves: bz#568816
    • CVE: CVE-2010-0431

Обновленные пакеты

Oracle Linux 5

Oracle Linux x86_64

kmod-kvm

83-164.0.1.el5_5.21

kvm

83-164.0.1.el5_5.21

kvm-qemu-img

83-164.0.1.el5_5.21

kvm-tools

83-164.0.1.el5_5.21

Связанные уязвимости

ubuntu
почти 15 лет назад

QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly validate guest QXL driver pointers, which allows guest OS users to cause a denial of service (invalid pointer dereference and guest OS crash) or possibly gain privileges via unspecified vectors.

redhat
почти 15 лет назад

QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly validate guest QXL driver pointers, which allows guest OS users to cause a denial of service (invalid pointer dereference and guest OS crash) or possibly gain privileges via unspecified vectors.

nvd
почти 15 лет назад

QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly validate guest QXL driver pointers, which allows guest OS users to cause a denial of service (invalid pointer dereference and guest OS crash) or possibly gain privileges via unspecified vectors.

debian
почти 15 лет назад

QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat E ...

github
около 3 лет назад

QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly validate guest QXL driver pointers, which allows guest OS users to cause a denial of service (invalid pointer dereference and guest OS crash) or possibly gain privileges via unspecified vectors.