Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-0743

Опубликовано: 10 июн. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2014-0743: qemu-kvm security and bug fix update (MODERATE)

[0.12.1.2-2.415.el6_5.10]

  • kvm-virtio-out-of-bounds-buffer-write-on-invalid-state-l.patch [bz#1095692]
  • kvm-usb-sanity-check-setup_index-setup_len-in-post_load.patch [bz#1095743]
  • kvm-usb-sanity-check-setup_index-setup_len-in-post_load-2.patch [bz#1095743]
  • kvm-virtio-scsi-fix-buffer-overrun-on-invalid-state-load.patch [bz#1095739]
  • kvm-virtio-avoid-buffer-overrun-on-incoming-migration.patch [bz#1095735]
  • kvm-virtio-validate-num_sg-when-mapping.patch [bz#1095763 bz#1096124]
  • kvm-virtio-allow-mapping-up-to-max-queue-size.patch [bz#1095763 bz#1096124]
  • kvm-enable-PCI-multiple-segments-for-pass-through-device.patch [bz#1099941]
  • kvm-virtio-net-fix-buffer-overflow-on-invalid-state-load.patch [bz#1095675]
  • kvm-virtio-validate-config_len-on-load.patch [bz#1095779]
  • kvm-usb-fix-up-post-load-checks.patch [bz#1096825]
  • kvm-CPU-hotplug-use-apic_id_for_cpu-round-2-RHEL-6-only.patch [bz#1100575]
  • Resolves: bz#1095675 ()
  • Resolves: bz#1095692 ()
  • Resolves: bz#1095735 ()
  • Resolves: bz#1095739 ()
  • Resolves: bz#1095743 ()
  • Resolves: bz#1095763 ()
  • Resolves: bz#1095779 ()
  • Resolves: bz#1096124 ()
  • Resolves: bz#1096825 ()
  • Resolves: bz#1099941 ()
  • Resolves: bz#1100575 (Some vCPU topologies not accepted by libvirt)

[0.12.1.2-2.415.el6_5.9]

  • kvm-ide-Correct-improper-smart-self-test-counter-reset-i.patch [bz#1087978]
  • Resolves: bz#1087978 (CVE-2014-2894 qemu-kvm: QEMU: out of bounds buffer accesses, guest triggerable via IDE SMART [rhel-6.5.z])

Связанные уязвимости

oracle-oval
около 11 лет назад

ELSA-2014-0927: qemu-kvm security and bug fix update (MODERATE)

ubuntu
почти 11 лет назад

Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.

redhat
больше 11 лет назад

Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.

nvd
почти 11 лет назад

Integer signedness error in the virtio_net_load function in hw/net/virtio-net.c in QEMU 1.x before 1.7.2 allows remote attackers to execute arbitrary code via a crafted savevm image, which triggers a buffer overflow.

debian
почти 11 лет назад

Integer signedness error in the virtio_net_load function in hw/net/vir ...