Lucene search

K
oraclelinuxOracleELSA-2014-0163
HistoryFeb 12, 2014 - 12:00 a.m.

kvm security update

2014-02-1200:00:00
Oracle
linux.oracle.com
18

0.023 Low

EPSS

Percentile

88.5%

[kvm-83-266.0.1.el5_10.1]

  • Added kvm-add-oracle-workaround-for-libvirt-bug.patch
  • Added kvm-Introduce-oel-machine-type.patch
    [kvm-83-266_10.1.el5]
  • KVM: x86: prevent cross page vapic_addr access (CVE-2013-6368) [bz#1032219]
  • KVM: x86: Fix potential divide by 0 in lapic (CVE-2013-6367) [bz#1032216]
  • Resolves: bz#1032219
    (CVE-2013-6368 kvm: cross page vapic_addr access [rhel-5.10])
  • Resolves: bz#1032216
    CVE-2013-6367 kvm: division by zero in apic_get_tmcct() [rhel-5.10.z]
    [kvm-83-266.el5]
  • Updated kversion to 2.6.18-348.4.1.el5
  • kvm-fix-l1_map-buffer-overflow.patch [bz#956511]
  • Resolves: bz#956511
    (qemu-kvm segfault in tb_invalidate_phys_page_range())
    [kvm-83-265.el5]
  • kvm-kernel-kvm-accept-unaligned-MSR_KVM_SYSTEM_TIME-writes.patch [bz#924597]
  • Resolves: bz#924597
    (RHEL.5.8.32 guest hang when installing)
    [kvm-83-264.el5]
  • kvm-kernel-KVM-Fix-for-buffer-overflow-in-handling-of-MSR_KVM_S.patch [bz#917019]
  • kvm-kernel-KVM-Convert-MSR_KVM_SYSTEM_TIME-to-use-kvm_write_gue.patch [bz#917023]
  • kvm-kernel-KVM-Fix-bounds-checking-in-ioapic-indirect-register-.patch [bz#917029]
  • kvm-kernel-do-not-GP-on-unaligned-MSR_KVM_SYSTEM_TIME-write.patch [bz#bz917019]
  • Resolves: bz#917019
    (CVE-2013-1796 kernel: kvm: buffer overflow in handling of MSR_KVM_SYSTEM_TIME [rhel-5.10])
  • Resolves: bz#917023
    (CVE-2013-1797 kernel: kvm: after free issue with the handling of MSR_KVM_SYSTEM_TIME [rhel-5.10])
  • Resolves: bz#917029
    (CVE-2013-1798 kernel: kvm: out-of-bounds access in ioapic indirect register reads [rhel-5.10])
    [kvm-83-263.el5]
  • kvm-e1000-Discard-packets-that-are-too-long-if-SBP-and-L.patch [bz#910840]
  • kvm-e1000-Discard-oversized-packets-based-on-SBP-LPE.patch [bz#910840]
  • Resolves: bz#910840
    (CVE-2012-6075 qemu (e1000 device driver): Buffer overflow when processing large packets when SBP and LPE flags are disabled [rhel-5.10])