Описание
ELSA-2012-0149: kvm security and bug fix update (MODERATE)
[kvm-83-249.0.1.el5]
- Added kvm-add-oracle-workaround-for-libvirt-bug.patch
- Added kvm-Introduce-oel-machine-type.patch
- modify kversion to fix build failure
[kvm-83-249.el5]
- kvm-kernel-KVM-x86-Prevent-starting-PIT-timers-in-the-absence-o.patch [bz#770101]
- CVE: CVE-2011-4622
- Resolves: bz#770101 (CVE-2011-4622 kernel: kvm: pit timer with no irqchip crashes the system [rhel-5.8])
[kvm-83-248.el5]
- kvm-e1000-prevent-buffer-overflow-when-processing-legacy.patch [bz#772080]
- CVE: CVE-2012-0029
- Resolves: bz#772080 (EMBARGOED CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow [rhel-5.8])
[kvm-83-247.el5]
- kvm-kernel-KVM-Remove-ability-to-assign-a-device-without-iommu-.patch [bz#770095]
- kvm-kernel-KVM-Device-assignment-permission-checks.patch [bz#770095]
- Resolves: bz#770095 (CVE-2011-4347 kernel: kvm: device assignment DoS [rhel-5.8])
[kvm-83-246.el5]
- kvm-Fix-SIGFPE-for-vnc-display-of-width-height-1.patch [bz#751482]
- Resolves: bz#751482 (Backport SIGFPE fix in qemu-kvm VNC to RHEL5.x)
[kvm-83-245.el5]
- kvm-Fix-external-module-compat.c-not-to-use-unsupported-.patch [bz#753860]
- Resolves: bz#753860 (Fix kvm userspace compilation on RHEL-5 to match the kernel changes)
[kvm-83-244.el5]
- kvm-do-not-change-RTC-stored-time-accidentally.patch [bz#703335]
- Resolves: bz#703335 (KVM guest clocks jump forward one hour on reboot)
[kvm-83-243.el5]
- kvm-e1000-multi-buffer-packet-support.patch [bz#703446]
- kvm-e1000-clear-EOP-for-multi-buffer-descriptors.patch [bz#703446]
- kvm-e1000-verify-we-have-buffers-upfront.patch [bz#703446]
- kvm-BZ725876-make-RTC-alarm-work.patch [bz#725876]
- kvm-BZ725876-fix-RTC-polling-mode.patch [bz#725876]
- Resolves: bz#703446 (Failed to ping guest after MTU is changed)
- Resolves: bz#725876 (RTC interrupt problems with RHEL5 qemu/kvm (0.10 based) on 2.6.38+ guest kernels.)
[kvm-83-242.el5]
- kvm-posix-aio-compat-fix-latency-issues.patch [bz#725629]
- Resolves: bz#725629 (RHEL5.5 KVM VMs freezing for a few seconds)
[kvm-83-241.el5]
- kvm-pci-assign-limit-number-of-assigned-devices-via-hotp.patch [bz#701616]
- kvm-pci-assign-Cleanup-file-descriptors.patch [bz#700281]
- Resolves: bz#700281 ([Intel 5.8 Bug] Fail to attach/detach NIC more than 250 times)
- Resolves: bz#701616 (limitation on max number of assigned devices does not take effect if hot-plug pci devices)
[kvm-83-240.el5]
- Updated kversion to 2.6.18-275.el to match build root
- kvm-Fix-vga-segfaults-or-screen-corruption-with-large-me.patch [bz#704081]
- Resolves: bz#704081 (mouse responds very slowly with huge memory)
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kmod-kvm
83-249.0.1.el5
kmod-kvm-debug
83-249.0.1.el5
kvm
83-249.0.1.el5
kvm-qemu-img
83-249.0.1.el5
kvm-tools
83-249.0.1.el5
Связанные CVE
Связанные уязвимости
The kvm_vm_ioctl_assign_device function in virt/kvm/assigned-dev.c in the KVM subsystem in the Linux kernel before 3.1.10 does not verify permission to access PCI configuration space and BAR resources, which allows host OS users to assign PCI devices and cause a denial of service (host OS crash) via a KVM_ASSIGN_PCI_DEVICE operation.
The kvm_vm_ioctl_assign_device function in virt/kvm/assigned-dev.c in the KVM subsystem in the Linux kernel before 3.1.10 does not verify permission to access PCI configuration space and BAR resources, which allows host OS users to assign PCI devices and cause a denial of service (host OS crash) via a KVM_ASSIGN_PCI_DEVICE operation.
The kvm_vm_ioctl_assign_device function in virt/kvm/assigned-dev.c in the KVM subsystem in the Linux kernel before 3.1.10 does not verify permission to access PCI configuration space and BAR resources, which allows host OS users to assign PCI devices and cause a denial of service (host OS crash) via a KVM_ASSIGN_PCI_DEVICE operation.
The kvm_vm_ioctl_assign_device function in virt/kvm/assigned-dev.c in ...
The kvm_vm_ioctl_assign_device function in virt/kvm/assigned-dev.c in the KVM subsystem in the Linux kernel before 3.1.10 does not verify permission to access PCI configuration space and BAR resources, which allows host OS users to assign PCI devices and cause a denial of service (host OS crash) via a KVM_ASSIGN_PCI_DEVICE operation.