![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.122328 |
Category: | Oracle Linux Local Security Checks |
Title: | Oracle: Security Advisory (ELSA-2010-0627) |
Summary: | The remote host is missing an update for the 'kvm' package(s) announced via the ELSA-2010-0627 advisory. |
Description: | Summary: The remote host is missing an update for the 'kvm' package(s) announced via the ELSA-2010-0627 advisory. Vulnerability Insight: [kvm-83-164.0.1.el5_5.21] - Added kvm-add-oracle-workaround-for-libvirt-bug.patch - Added kvm-Introduce-oel-machine-type.patch [kvm-83-164.el5_5.21] - kvm-Fix-segfault-in-mmio-subpage-handling-code.patch [bz#619412] - Resolves: bz#619412 (CVE-2010-2784 qemu: insufficient constraints checking in exec.c:subpage_register() [rhel-5.5.z]) [kvm-83-164.el5_5.20] - kvm-virtio-net-correct-packet-length-checks.patch [bz#610343] - Resolves: bz#610343 (Virtio: Transfer file caused guest in same vlan abnormally quit) [kvm-83-164.el5_5.19] - kvm-qcow2-Fix-qemu-img-check-segfault-on-corrupted-image.patch [bz#610342] - kvm-qcow2-Don-t-try-to-check-tables-that-couldn-t-be-loa.patch [bz#610342] - kvm-qemu-img-check-Distinguish-different-kinds-of-errors.patch [bz#618206] - kvm-qcow2-Change-check-to-distinguish-error-cases.patch [bz#618206] - Resolves: bz#610342 ([kvm] segmentation fault when running qemu-img check on faulty image) - Resolves: bz#618206 ([kvm] qemu image check returns cluster errors when using virtIO block (thinly provisioned) during e_no_space events (along with EIO errors)) [kvm-83-164.el5_5.18] - kvm-New-slots-need-dirty-tracking-enabled-when-migrating.patch [bz#618205] - Resolves: bz#618205 (SPICE - race in KVM/Spice would cause migration to fail (slots are not registered properly?)) [kvm-83-164.el5_5.17] - kvm-kernel-KVM-MMU-fix-conflict-access-permissions-in-direct-sp.patch [bz#616796] - Resolves: bz#616796 (KVM uses wrong permissions for large guest pages) [kvm-83-164.el5_5.16] - kvm-kernel-fix-null-pointer-dereference.patch [bz#570531] - Resolves: bz#570531 - CVE: CVE-2010-0435 - kvm-qemu-fix-unsafe-ring-handling.patch [bz#568816] - Resolves: bz#568816 - CVE: CVE-2010-0431 Affected Software/OS: 'kvm' package(s) on Oracle Linux 5. Solution: Please install the updated package(s). CVSS Score: 6.6 CVSS Vector: AV:L/AC:M/Au:S/C:C/I:C/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2010-0431 RHSA-2010:0622 https://rhn.redhat.com/errata/RHSA-2010-0622.html RHSA-2010:0627 https://rhn.redhat.com/errata/RHSA-2010-0627.html https://bugzilla.redhat.com/show_bug.cgi?id=568809 Common Vulnerability Exposure (CVE) ID: CVE-2010-0435 42778 http://secunia.com/advisories/42778 ADV-2011-0012 http://www.vupen.com/english/advisories/2011/0012 SUSE-SA:2011:001 http://lists.opensuse.org/opensuse-security-announce/2011-01/msg00000.html https://bugzilla.redhat.com/show_bug.cgi?id=570528 Common Vulnerability Exposure (CVE) ID: CVE-2010-2784 [kvm] 20100728 [PATCH 1/2] Fix segfault in mmio subpage handling code http://www.spinics.net/lists/kvm/msg39173.html https://bugzilla.redhat.com/show_bug.cgi?id=619411 |
Copyright | Copyright (C) 2015 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |