Описание
ELSA-2013-0896: qemu-kvm security and bug fix update (MODERATE)
[0.12.1.2-2.355.el6_4.5]
- kvm-e1000-fix-link-down-handling-with-auto-negotiation.patch [bz#907716]
- kvm-e1000-unbreak-the-guest-network-when-migration-to-RH.patch [bz#907716]
- kvm-reimplement-error_setg-and-error_setg_errno-for-RHEL.patch [bz#957056]
- kvm-qga-set-umask-0077-when-daemonizing-CVE-2013-2007.patch [bz#957056]
- kvm-qga-distinguish-binary-modes-in-guest_file_open_mode.patch [bz#957056]
- kvm-qga-unlink-just-created-guest-file-if-fchmod-or-fdop.patch [bz#957056]
- Resolves: bz#907716 (use set_link to change rtl8139 and e1000 network card's status but fail to make effectively after reboot guest)
- Resolves: bz#957056 (CVE-2013-2007 qemu: guest agent creates files with insecure permissions in deamon mode [rhel-6.4.z])
[0.12.1.2-2.355.el6_4.4]
- kvm-virtio-balloon-fix-integer-overflow-in-BALLOON_CHANG.patch [bz#958750]
- Resolves: bz#958750 (QMP event shows incorrect balloon value when balloon size is grater than or equal to 4G)
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
qemu-guest-agent
0.12.1.2-2.355.el6_4.5
qemu-guest-agent-win32
0.12.1.2-2.355.el6_4.5
qemu-img
0.12.1.2-2.355.el6_4.5
qemu-kvm
0.12.1.2-2.355.el6_4.5
qemu-kvm-tools
0.12.1.2-2.355.el6_4.5
Oracle Linux i686
qemu-guest-agent
0.12.1.2-2.355.el6_4.5
Связанные CVE
Связанные уязвимости
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when s ...
The qemu guest agent in Qemu 1.4.1 and earlier, as used by Xen, when started in daemon mode, uses weak permissions for certain files, which allows local users to read and write to these files.