Type: | SECURITY |
Severity: | MODERATE |
Release Date: | 2013-06-03 |
[0.12.1.2-2.355.el6_4.5]
- kvm-e1000-fix-link-down-handling-with-auto-negotiation.patch [bz#907716]
- kvm-e1000-unbreak-the-guest-network-when-migration-to-RH.patch [bz#907716]
- kvm-reimplement-error_setg-and-error_setg_errno-for-RHEL.patch [bz#957056]
- kvm-qga-set-umask-0077-when-daemonizing-CVE-2013-2007.patch [bz#957056]
- kvm-qga-distinguish-binary-modes-in-guest_file_open_mode.patch [bz#957056]
- kvm-qga-unlink-just-created-guest-file-if-fchmod-or-fdop.patch [bz#957056]
- Resolves: bz#907716
(use set_link to change rtl8139 and e1000 network card's status but fail to make effectively after reboot guest)
- Resolves: bz#957056
(CVE-2013-2007 qemu: guest agent creates files with insecure permissions in deamon mode [rhel-6.4.z])
[0.12.1.2-2.355.el6_4.4]
- kvm-virtio-balloon-fix-integer-overflow-in-BALLOON_CHANG.patch [bz#958750]
- Resolves: bz#958750
(QMP event shows incorrect balloon value when balloon size is grater than or equal to 4G)
CVE-2013-2007 |
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
Oracle Linux 6 (i386) | qemu-kvm-0.12.1.2-2.355.el6_4.5.src.rpm | aa48cb5bf7f2f5c3d746df6ce9e6d5bc | ELSA-2020-4056 |
qemu-guest-agent-0.12.1.2-2.355.el6_4.5.i686.rpm | 15cf998a4390193bb435efa1a0bad8dd | ELSA-2020-4056 | |
Oracle Linux 6 (x86_64) | qemu-kvm-0.12.1.2-2.355.el6_4.5.src.rpm | aa48cb5bf7f2f5c3d746df6ce9e6d5bc | ELSA-2020-4056 |
qemu-guest-agent-0.12.1.2-2.355.el6_4.5.x86_64.rpm | 0f2c2ccb1fd94418772f456cb439d471 | ELSA-2020-4056 | |
qemu-guest-agent-win32-0.12.1.2-2.355.el6_4.5.x86_64.rpm | 9079b440e0d6a5c3ca8e75e81874f96a | ELBA-2013-1401 | |
qemu-img-0.12.1.2-2.355.el6_4.5.x86_64.rpm | 5577f06a2ae86b897b35415df40b80cd | ELSA-2020-4056 | |
qemu-kvm-0.12.1.2-2.355.el6_4.5.x86_64.rpm | f0d55651255ee1905a6962231da3d339 | ELSA-2020-4056 | |
qemu-kvm-tools-0.12.1.2-2.355.el6_4.5.x86_64.rpm | ba0ebbc63e408386aba6fc3e7c31b00b | ELSA-2020-4056 |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team