Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2011-0919

Опубликовано: 05 июл. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2011-0919: qemu-kvm security and bug fix update (IMPORTANT)

[qemu-kvm-0.12.1.2-2.160.el6_1.2]

  • kvm-virtio-guard-against-negative-vq-notifies.patch [bz#717403]
  • Resolves: bz#717403 (qemu-kvm: OOB memory access caused by negative vq notifies [rhel-6.1.z])

[qemu-kvm-0.12.1.2-2.160.el6_1]

  • kvm-Fix-phys-memory-client-pass-guest-physical-address-n.patch [bz#701771]
  • kvm-virtio-prevent-indirect-descriptor-buffer-overflow.patch [bz#713592]
  • Resolves: bz#701771 (Fix phys memory client for vhost)
  • Resolves: bz#713592 (EMBARGOED CVE-2011-2212 virtqueue: too-large indirect descriptor buffer overflow [rhel-6.1.z])

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

qemu-img

0.12.1.2-2.160.el6_1.2

qemu-kvm

0.12.1.2-2.160.el6_1.2

qemu-kvm-tools

0.12.1.2-2.160.el6_1.2

Связанные CVE

Связанные уязвимости

fstec
около 13 лет назад

Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации

suse-cvrf
почти 13 лет назад

Security update for kvm

ubuntu
около 13 лет назад

The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.

redhat
около 14 лет назад

The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.

nvd
около 13 лет назад

The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.