Описание
ELSA-2012-0051: kvm security update (IMPORTANT)
[kvm-83-239.0.1.el5_7.1]
- Added kvm-add-oracle-workaround-for-libvirt-bug.patch
- Added kvm-Introduce-oel-machine-type.patch
[kvm-83-239.el5_7.1]
- kvm-e1000-prevent-buffer-overflow-when-processing-legacy.patch [bz#772079]
- Resolves: bz#772079 (EMBARGOED CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [rhel-5.7.z])
- kvm-Fix-external-module-compat.c-not-to-use-unsupported-.patch [bz#753860] (build fix)
- kvm-kernel-KVM-x86-Prevent-starting-PIT-timers-in-the-absence-o.patch [bz#770100]
- Resolves: bz#770100 (CVE-2011-4622 kernel: kvm: pit timer with no irqchip crashes the system [rhel-5.7.z])
[kvm-83-239.el5_7.1]
- Updated kversion to 2.6.18-274.17.1.el5 to match build root
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kmod-kvm
83-239.0.1.el5_7.1
kmod-kvm-debug
83-239.0.1.el5_7.1
kvm
83-239.0.1.el5_7.1
kvm-qemu-img
83-239.0.1.el5_7.1
kvm-tools
83-239.0.1.el5_7.1
Связанные CVE
Связанные уязвимости
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Heap-based buffer overflow in the process_tx_desc function in the e1000 emulation (hw/e1000.c) in qemu-kvm 0.12, and possibly other versions, allows guest OS users to cause a denial of service (QEMU crash) and possibly execute arbitrary code via crafted legacy mode packets.
Heap-based buffer overflow in the process_tx_desc function in the e100 ...
The create_pit_timer function in arch/x86/kvm/i8254.c in KVM 83, and possibly other versions, does not properly handle when Programmable Interval Timer (PIT) interrupt requests (IRQs) when a virtual interrupt controller (irqchip) is not available, which allows local users to cause a denial of service (NULL pointer dereference) by starting a timer.