Описание
ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)
[0.12.1.2-2.415.el6_5.10]
- kvm-virtio-out-of-bounds-buffer-write-on-invalid-state-l.patch [bz#1095692]
- kvm-usb-sanity-check-setup_index-setup_len-in-post_load.patch [bz#1095743]
- kvm-usb-sanity-check-setup_index-setup_len-in-post_load-2.patch [bz#1095743]
- kvm-virtio-scsi-fix-buffer-overrun-on-invalid-state-load.patch [bz#1095739]
- kvm-virtio-avoid-buffer-overrun-on-incoming-migration.patch [bz#1095735]
- kvm-virtio-validate-num_sg-when-mapping.patch [bz#1095763 bz#1096124]
- kvm-virtio-allow-mapping-up-to-max-queue-size.patch [bz#1095763 bz#1096124]
- kvm-enable-PCI-multiple-segments-for-pass-through-device.patch [bz#1099941]
- kvm-virtio-net-fix-buffer-overflow-on-invalid-state-load.patch [bz#1095675]
- kvm-virtio-validate-config_len-on-load.patch [bz#1095779]
- kvm-usb-fix-up-post-load-checks.patch [bz#1096825]
- kvm-CPU-hotplug-use-apic_id_for_cpu-round-2-RHEL-6-only.patch [bz#1100575]
- Resolves: bz#1095675 ()
- Resolves: bz#1095692 ()
- Resolves: bz#1095735 ()
- Resolves: bz#1095739 ()
- Resolves: bz#1095743 ()
- Resolves: bz#1095763 ()
- Resolves: bz#1095779 ()
- Resolves: bz#1096124 ()
- Resolves: bz#1096825 ()
- Resolves: bz#1099941 ()
- Resolves: bz#1100575 (Some vCPU topologies not accepted by libvirt)
[0.12.1.2-2.415.el6_5.9]
- kvm-ide-Correct-improper-smart-self-test-counter-reset-i.patch [bz#1087978]
- Resolves: bz#1087978 (CVE-2014-2894 qemu-kvm: QEMU: out of bounds buffer accesses, guest triggerable via IDE SMART [rhel-6.5.z])
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
qemu-guest-agent
0.12.1.2-2.415.el6_5.10
qemu-img
0.12.1.2-2.415.el6_5.10
qemu-kvm
0.12.1.2-2.415.el6_5.10
qemu-kvm-tools
0.12.1.2-2.415.el6_5.10
Oracle Linux i686
qemu-guest-agent
0.12.1.2-2.415.el6_5.10
Ссылки на источники
Связанные уязвимости
ELSA-2014-0927: qemu-kvm security and bug fix update (MODERATE)
Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.
Integer signedness error in the virtio_net_load function in hw/net/vir ...