Описание
ELSA-2020-5543: Unbreakable Enterprise kernel security update (IMPORTANT)
[4.1.12-124.36.4]
- KVM: nVMX: Check IO instruction VM-exit conditions (Oliver Upton) [Orabug: 30944739] {CVE-2020-2732}
- KVM: nVMX: Refactor IO bitmap checks into helper function (Oliver Upton) [Orabug: 30944739] {CVE-2020-2732}
- KVM: nVMX: Don't emulate instructions in guest mode (Paolo Bonzini) [Orabug: 30944739] {CVE-2020-2732}
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
kernel-uek
4.1.12-124.36.4.el6uek
kernel-uek-debug
4.1.12-124.36.4.el6uek
kernel-uek-debug-devel
4.1.12-124.36.4.el6uek
kernel-uek-devel
4.1.12-124.36.4.el6uek
kernel-uek-doc
4.1.12-124.36.4.el6uek
kernel-uek-firmware
4.1.12-124.36.4.el6uek
Oracle Linux 7
Oracle Linux x86_64
kernel-uek
4.1.12-124.36.4.el7uek
kernel-uek-debug
4.1.12-124.36.4.el7uek
kernel-uek-debug-devel
4.1.12-124.36.4.el7uek
kernel-uek-devel
4.1.12-124.36.4.el7uek
kernel-uek-doc
4.1.12-124.36.4.el7uek
kernel-uek-firmware
4.1.12-124.36.4.el7uek
Связанные CVE
Связанные уязвимости
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.
A flaw was discovered in the way that the KVM hypervisor handled instr ...
A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.