Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
146377 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.122328
Categoría:Oracle Linux Local Security Checks
Título:Oracle: Security Advisory (ELSA-2010-0627)
Resumen:The remote host is missing an update for the 'kvm' package(s) announced via the ELSA-2010-0627 advisory.
Descripción:Summary:
The remote host is missing an update for the 'kvm' package(s) announced via the ELSA-2010-0627 advisory.

Vulnerability Insight:
[kvm-83-164.0.1.el5_5.21]
- Added kvm-add-oracle-workaround-for-libvirt-bug.patch
- Added kvm-Introduce-oel-machine-type.patch

[kvm-83-164.el5_5.21]
- kvm-Fix-segfault-in-mmio-subpage-handling-code.patch [bz#619412]
- Resolves: bz#619412
(CVE-2010-2784 qemu: insufficient constraints checking in exec.c:subpage_register() [rhel-5.5.z])

[kvm-83-164.el5_5.20]
- kvm-virtio-net-correct-packet-length-checks.patch [bz#610343]
- Resolves: bz#610343
(Virtio: Transfer file caused guest in same vlan abnormally quit)

[kvm-83-164.el5_5.19]
- kvm-qcow2-Fix-qemu-img-check-segfault-on-corrupted-image.patch [bz#610342]
- kvm-qcow2-Don-t-try-to-check-tables-that-couldn-t-be-loa.patch [bz#610342]
- kvm-qemu-img-check-Distinguish-different-kinds-of-errors.patch [bz#618206]
- kvm-qcow2-Change-check-to-distinguish-error-cases.patch [bz#618206]
- Resolves: bz#610342
([kvm] segmentation fault when running qemu-img check on faulty image)
- Resolves: bz#618206
([kvm] qemu image check returns cluster errors when using virtIO block (thinly provisioned) during e_no_space events (along with EIO errors))

[kvm-83-164.el5_5.18]
- kvm-New-slots-need-dirty-tracking-enabled-when-migrating.patch [bz#618205]
- Resolves: bz#618205
(SPICE - race in KVM/Spice would cause migration to fail (slots are not registered properly?))

[kvm-83-164.el5_5.17]
- kvm-kernel-KVM-MMU-fix-conflict-access-permissions-in-direct-sp.patch [bz#616796]
- Resolves: bz#616796
(KVM uses wrong permissions for large guest pages)

[kvm-83-164.el5_5.16]
- kvm-kernel-fix-null-pointer-dereference.patch [bz#570531]
- Resolves: bz#570531
- CVE: CVE-2010-0435
- kvm-qemu-fix-unsafe-ring-handling.patch [bz#568816]
- Resolves: bz#568816
- CVE: CVE-2010-0431

Affected Software/OS:
'kvm' package(s) on Oracle Linux 5.

Solution:
Please install the updated package(s).

CVSS Score:
6.6

CVSS Vector:
AV:L/AC:M/Au:S/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2010-0431
RHSA-2010:0622
https://rhn.redhat.com/errata/RHSA-2010-0622.html
RHSA-2010:0627
https://rhn.redhat.com/errata/RHSA-2010-0627.html
https://bugzilla.redhat.com/show_bug.cgi?id=568809
Common Vulnerability Exposure (CVE) ID: CVE-2010-0435
42778
http://secunia.com/advisories/42778
ADV-2011-0012
http://www.vupen.com/english/advisories/2011/0012
SUSE-SA:2011:001
http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html
https://bugzilla.redhat.com/show_bug.cgi?id=570528
Common Vulnerability Exposure (CVE) ID: CVE-2010-2784
[kvm] 20100728 [PATCH 1/2] Fix segfault in mmio subpage handling code
http://www.spinics.net/lists/kvm/msg39173.html
https://bugzilla.redhat.com/show_bug.cgi?id=619411
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.