Описание
ELSA-2014-0163: kvm security update (IMPORTANT)
[kvm-83-266.0.1.el5_10.1]
- Added kvm-add-oracle-workaround-for-libvirt-bug.patch
- Added kvm-Introduce-oel-machine-type.patch
[kvm-83-266_10.1.el5]
- KVM: x86: prevent cross page vapic_addr access (CVE-2013-6368) [bz#1032219]
- KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) [bz#1032216]
- Resolves: bz#1032219 (CVE-2013-6368 kvm: cross page vapic_addr access [rhel-5.10])
- Resolves: bz#1032216 CVE-2013-6367 kvm: division by zero in apic_get_tmcct() [rhel-5.10.z]
[kvm-83-266.el5]
- Updated kversion to 2.6.18-348.4.1.el5
- kvm-fix-l1_map-buffer-overflow.patch [bz#956511]
- Resolves: bz#956511 (qemu-kvm segfault in tb_invalidate_phys_page_range())
[kvm-83-265.el5]
- kvm-kernel-kvm-accept-unaligned-MSR_KVM_SYSTEM_TIME-writes.patch [bz#924597]
- Resolves: bz#924597 (RHEL.5.8.32 guest hang when installing)
[kvm-83-264.el5]
- kvm-kernel-KVM-Fix-for-buffer-overflow-in-handling-of-MSR_KVM_S.patch [bz#917019]
- kvm-kernel-KVM-Convert-MSR_KVM_SYSTEM_TIME-to-use-kvm_write_gue.patch [bz#917023]
- kvm-kernel-KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch [bz#917029]
- kvm-kernel-do-not-GP-on-unaligned-MSR_KVM_SYSTEM_TIME-write.patch [bz#bz917019]
- Resolves: bz#917019 (CVE-2013-1796 kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME [rhel-5.10])
- Resolves: bz#917023 (CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME [rhel-5.10])
- Resolves: bz#917029 (CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads [rhel-5.10])
[kvm-83-263.el5]
- kvm-e1000-Discard-packets-that-are-too-long-if-SBP-and-L.patch [bz#910840]
- kvm-e1000-Discard-oversized-packets-based-on-SBP-LPE.patch [bz#910840]
- Resolves: bz#910840 (CVE-2012-6075 qemu (e1000 device driver): Buffer overflow when processing large packets when SBP and LPE flags are disabled [rhel-5.10])
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
kmod-kvm
83-266.0.1.el5_10.1
kmod-kvm-debug
83-266.0.1.el5_10.1
kvm
83-266.0.1.el5_10.1
kvm-qemu-img
83-266.0.1.el5_10.1
kvm-tools
83-266.0.1.el5_10.1
Связанные CVE
Связанные уязвимости
ELSA-2013-2587: unbreakable enterprise kernel security update (IMPORTANT)
ELSA-2013-1801: kernel security, bug fix, and enhancement update (IMPORTANT)
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.
The KVM subsystem in the Linux kernel through 3.12.5 allows local users to gain privileges or cause a denial of service (system crash) via a VAPIC synchronization operation involving a page-end address.