ELSA-2010-0126

ELSA-2010-0126 - kvm security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2010-03-01

Description



[kvm-83-105.0.1.el5_4.27]
- Add kvm-add-oracle-workaround-for-libvirt-bug.patch

[kvm-83-105.el5_4.27]
- kvm-kernel-KVM-VMX-Check-cpl-before-emulating-debug-register-ac.patch [bz#563516]
- Resolves: bz#563516
(KVM: Check cpl before emulating debug register access [rhel-5.4.z])

[kvm-83-105.el5_4.26]
- kvm-kernel-KVM-Don-t-check-access-permission-when-loading-segme.patch [bz#563464]
- kvm-kernel-KVM-Disable-move-to-segment-registers-and-jump-far-i.patch [bz#563464]
- Resolves: bz#563464
(EMBARGOED CVE-2010-0419 kvm: emulator privilege escalation segment selector check [rhel-5.4.z])

[kvm-83-105.el5_4.25]
- kvm-virtio-blk-Fix-reads-turned-into-writes-after-read-e.patch [bz#562776]
- kvm-virtio-blk-Handle-bdrv_aio_read-write-NULL-return.patch [bz#562776]
- Resolves: bz#562776
(Guest image corruption after RHEV-H update to 5.4-2.1.3.el5_4rhev2_1)

[kvm-83-105.el5_4.24]
- Apply bz#561022 patches again (undo the reverts from kvm-83-105.el5_4.23)
- kvm-qemu-add-routines-for-atomic-16-bit-accesses-take-2.patch [bz#561022]
- kvm-qemu-virtio-atomic-access-for-index-values-take-2.patch [bz#561022]
- Resolves: bz#561022
(QEMU terminates without warning with virtio-net and SMP enabled)

[kvm-83-105.el5_4.23]
- Revert bz#561022 patches by now, until they get better testing
- kvm-Revert-qemu-virtio-atomic-access-for-index-values.patch [bz#561022]
- kvm-Revert-qemu-add-routines-for-atomic-16-bit-accesses.patch [bz#561022]
- Related: bz#561022
(QEMU terminates without warning with virtio-net and SMP enabled)


Related CVEs


CVE-2010-0419
CVE-2009-3722

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (x86_64) kvm-83-105.0.1.el5_4.27.src.rpm286b162b962bd11e5fff3a39d77cb61a68bbfb6893ea84c8be618b606fed3613ELSA-2017-0454el5_u4_x86_64_patch
kmod-kvm-83-105.0.1.el5_4.27.x86_64.rpm161d9776dbd44c9ecae55712666de6c7c46f6221d2d2bf07682b2d56db673d65ELSA-2017-0454el5_u4_x86_64_patch
kvm-83-105.0.1.el5_4.27.x86_64.rpm3a28e370c80ca709d60b6769895b0d512fc0a8ab75d39115e37c4c20406321afELSA-2017-0454el5_u4_x86_64_patch
kvm-qemu-img-83-105.0.1.el5_4.27.x86_64.rpmec2b37453fadd1b6ab02885f64888e7af8a2763b1701ee955a74ad1c197f0244ELSA-2017-0454el5_u4_x86_64_patch
kvm-tools-83-105.0.1.el5_4.27.x86_64.rpm818821e67703f21e20f537cbd39a5f0ad1159add54889038550901539da9fdf1ELSA-2017-0454el5_u4_x86_64_patch



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete