ELSA-2011-0919

ELSA-2011-0919 - qemu-kvm security and bug fix update

Type:SECURITY
Impact:IMPORTANT
Release Date:2011-07-05

Description



[qemu-kvm-0.12.1.2-2.160.el6_1.2]
- kvm-virtio-guard-against-negative-vq-notifies.patch [bz#717403]
- Resolves: bz#717403
(qemu-kvm: OOB memory access caused by negative vq notifies [rhel-6.1.z])

[qemu-kvm-0.12.1.2-2.160.el6_1]
- kvm-Fix-phys-memory-client-pass-guest-physical-address-n.patch [bz#701771]
- kvm-virtio-prevent-indirect-descriptor-buffer-overflow.patch [bz#713592]
- Resolves: bz#701771
(Fix phys memory client for vhost)
- Resolves: bz#713592
(EMBARGOED CVE-2011-2212 virtqueue: too-large indirect descriptor buffer overflow [rhel-6.1.z])


Related CVEs


CVE-2011-2212
CVE-2011-2512

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 6 (x86_64) qemu-kvm-0.12.1.2-2.160.el6_1.2.src.rpme55b70584a22c5f81571aff4e9c4e3b3985289b0b9831321b03623c2a9dd5071ELSA-2020-4056ol6_u1_x86_64_patch
qemu-kvm-0.12.1.2-2.160.el6_1.2.src.rpme55b70584a22c5f81571aff4e9c4e3b3985289b0b9831321b03623c2a9dd5071ELSA-2020-4056ol6_x86_64_latest_archive
qemu-img-0.12.1.2-2.160.el6_1.2.x86_64.rpmed4853c36fa65b54bf089dc6cee7dcb366162977bbb90f72cbd5d15b254d2765ELSA-2020-4056ol6_u1_x86_64_patch
qemu-img-0.12.1.2-2.160.el6_1.2.x86_64.rpmed4853c36fa65b54bf089dc6cee7dcb366162977bbb90f72cbd5d15b254d2765ELSA-2020-4056ol6_x86_64_latest_archive
qemu-kvm-0.12.1.2-2.160.el6_1.2.x86_64.rpm5ceb62980f9b74eab705294fe9d715bde4d29b7ea2917320e70ba460ae6d6c88ELSA-2020-4056ol6_u1_x86_64_patch
qemu-kvm-0.12.1.2-2.160.el6_1.2.x86_64.rpm5ceb62980f9b74eab705294fe9d715bde4d29b7ea2917320e70ba460ae6d6c88ELSA-2020-4056ol6_x86_64_latest_archive
qemu-kvm-tools-0.12.1.2-2.160.el6_1.2.x86_64.rpmd53fb8e120ba002a6816fa7e6f2e27aa25013393222e94445e2b0038a930ed04ELSA-2020-4056ol6_u1_x86_64_patch
qemu-kvm-tools-0.12.1.2-2.160.el6_1.2.x86_64.rpmd53fb8e120ba002a6816fa7e6f2e27aa25013393222e94445e2b0038a930ed04ELSA-2020-4056ol6_x86_64_latest_archive



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete