Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2014-1075

Опубликовано: 19 авг. 2014
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2014-1075: qemu-kvm security and bug fix update (MODERATE)

[0.12.1.2-2.415.el6_5.14]

  • The commit for zrelease .13 was incomplete; the changes to qemu-kvm.spec did not include the '%patchNNNN -p1' lines for patches 4647 through 4655; so although the patch files themselves were committed, the srpm build did not pick them up. In addition, the commit log did not describe the patches.

    This commit corrects these problems and bumps the zrelease to .14.

[0.12.1.2-2.415.el6_5.13]

  • kvm-block-Create-proper-size-file-for-disk-mirror.patch [bz#1109715]
  • kvm-block-Fix-bdrv_is_allocated-return-value.patch [bz#1109715]
  • kvm-scsi-bus-prepare-scsi_req_new-for-introduction-of-pars.patch [bz#1125131]
  • kvm-scsi-bus-introduce-parse_cdb-in-SCSIDeviceClass-and-SC.patch [bz#1125131]
  • kvm-scsi-block-extract-scsi_block_is_passthrough.patch [bz#1125131]
  • kvm-scsi-block-scsi-generic-implement-parse_cdb.patch [bz#1125131]
  • kvm-virtio-scsi-implement-parse_cdb.patch [bz#1125131]
  • kvm-virtio-scsi-Fix-reset-callback-for-virtio-scsi.patch [bz#1123271]
  • kvm-virtio-scsi-add-ioeventfd-support.patch [bz#1123271]
  • Resolves: bz#1109715 (live incremental migration of vm with common shared base, size(disk) > size(base) transfers unallocated sectors, explodes disk on dest)
  • Resolves: bz#1123271 (Enable ioenventfd for virtio-scsi-pci)
  • Resolves: bz#1125131 ([FJ6.5 Bug] SCSI command issued from KVM guest doesn't reach target device)

[0.12.1.2-2.415.el6_5.12]

  • kvm-qcow-Return-real-error-code-in-qcow_open.txt [bz#1097225]
  • kvm-qcow1-Make-padding-in-the-header-explicit.txt [bz#1097225]
  • kvm-qcow1-Check-maximum-cluster-size.txt [bz#1097225]
  • kvm-qcow1-Validate-L2-table-size-CVE-2014-0222.txt [bz#1097225]
  • kvm-qcow1-Validate-image-size-CVE-2014-0223.txt [bz#1097234]
  • kvm-qcow1-Stricter-backing-file-length-check.txt [bz#1097234]
  • Resolves: bz#1097225 (CVE-2014-0222 qemu-kvm: Qemu: qcow1: validate L2 table size to avoid integer overflows [rhel-6.5.z])
  • Resolves: bz#1097234 (CVE-2014-0223 qemu-kvm: Qemu: qcow1: validate image size to avoid out-of-bounds memory access [rhel-6.5.z])

[0.12.1.2-2.415.el6_5.11]

  • kvm-block-Fix-bdrv_is_allocated-for-short-backing-files.patch [bz#1109715]
  • Resolves: bz#1109715 (live incremental migration of vm with common shared base, size(disk) > size(base) transfers unallocated sectors, explodes disk on dest)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

qemu-guest-agent

0.12.1.2-2.415.el6_5.14

qemu-img

0.12.1.2-2.415.el6_5.14

qemu-kvm

0.12.1.2-2.415.el6_5.14

qemu-kvm-tools

0.12.1.2-2.415.el6_5.14

Oracle Linux i686

qemu-guest-agent

0.12.1.2-2.415.el6_5.14

Связанные CVE

Связанные уязвимости

suse-cvrf
почти 13 лет назад

Security update for kvm

ubuntu
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

redhat
около 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

nvd
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU before 1.7.2 allows local users to cause a denial of service (crash) and possibly execute arbitrary code via a large image size, which triggers a buffer overflow or out-of-bounds read.

debian
почти 11 лет назад

Integer overflow in the qcow_open function in block/qcow.c in QEMU bef ...