Описание
ELSA-2018-1997: libvirt security and bug fix update (IMPORTANT)
[3.9.0-14.el7_5.6]
- logging: Don't inhibit shutdown in system daemon (rhbz#1573268)
- util: don't check for parallel iteration in hash-related functions (rhbz#1581364)
- cpu: define the 'virt-ssbd' CPUID feature bit (CVE-2018-3639)
- virNumaGetHugePageInfo: Return page_avail and page_free as ULL (rhbz#1582418)
Обновленные пакеты
Oracle Linux 7
Oracle Linux x86_64
libvirt
3.9.0-14.el7_5.6
libvirt-admin
3.9.0-14.el7_5.6
libvirt-client
3.9.0-14.el7_5.6
libvirt-daemon
3.9.0-14.el7_5.6
libvirt-daemon-config-network
3.9.0-14.el7_5.6
libvirt-daemon-config-nwfilter
3.9.0-14.el7_5.6
libvirt-daemon-driver-interface
3.9.0-14.el7_5.6
libvirt-daemon-driver-lxc
3.9.0-14.el7_5.6
libvirt-daemon-driver-network
3.9.0-14.el7_5.6
libvirt-daemon-driver-nodedev
3.9.0-14.el7_5.6
libvirt-daemon-driver-nwfilter
3.9.0-14.el7_5.6
libvirt-daemon-driver-qemu
3.9.0-14.el7_5.6
libvirt-daemon-driver-secret
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage-core
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage-disk
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage-gluster
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage-iscsi
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage-logical
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage-mpath
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage-rbd
3.9.0-14.el7_5.6
libvirt-daemon-driver-storage-scsi
3.9.0-14.el7_5.6
libvirt-daemon-kvm
3.9.0-14.el7_5.6
libvirt-daemon-lxc
3.9.0-14.el7_5.6
libvirt-devel
3.9.0-14.el7_5.6
libvirt-docs
3.9.0-14.el7_5.6
libvirt-libs
3.9.0-14.el7_5.6
libvirt-lock-sanlock
3.9.0-14.el7_5.6
libvirt-login-shell
3.9.0-14.el7_5.6
libvirt-nss
3.9.0-14.el7_5.6
Связанные CVE
Связанные уязвимости
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
Systems with microprocessors utilizing speculative execution and specu ...