Описание
ELSA-2011-0919: qemu-kvm security and bug fix update (IMPORTANT)
[qemu-kvm-0.12.1.2-2.160.el6_1.2]
- kvm-virtio-guard-against-negative-vq-notifies.patch [bz#717403]
- Resolves: bz#717403 (qemu-kvm: OOB memory access caused by negative vq notifies [rhel-6.1.z])
[qemu-kvm-0.12.1.2-2.160.el6_1]
- kvm-Fix-phys-memory-client-pass-guest-physical-address-n.patch [bz#701771]
- kvm-virtio-prevent-indirect-descriptor-buffer-overflow.patch [bz#713592]
- Resolves: bz#701771 (Fix phys memory client for vhost)
- Resolves: bz#713592 (EMBARGOED CVE-2011-2212 virtqueue: too-large indirect descriptor buffer overflow [rhel-6.1.z])
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
qemu-img
0.12.1.2-2.160.el6_1.2
qemu-kvm
0.12.1.2-2.160.el6_1.2
qemu-kvm-tools
0.12.1.2-2.160.el6_1.2
Связанные CVE
Связанные уязвимости
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.
The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.
The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.