Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.123397
Category:Oracle Linux Local Security Checks
Title:Oracle: Security Advisory (ELSA-2014-0743)
Summary:The remote host is missing an update for the 'qemu-kvm' package(s) announced via the ELSA-2014-0743 advisory.
Description:Summary:
The remote host is missing an update for the 'qemu-kvm' package(s) announced via the ELSA-2014-0743 advisory.

Vulnerability Insight:
[0.12.1.2-2.415.el6_5.10]
- kvm-virtio-out-of-bounds-buffer-write-on-invalid-state-l.patch [bz#1095692]
- kvm-usb-sanity-check-setup_index-setup_len-in-post_load.patch [bz#1095743]
- kvm-usb-sanity-check-setup_index-setup_len-in-post_load-2.patch [bz#1095743]
- kvm-virtio-scsi-fix-buffer-overrun-on-invalid-state-load.patch [bz#1095739]
- kvm-virtio-avoid-buffer-overrun-on-incoming-migration.patch [bz#1095735]
- kvm-virtio-validate-num_sg-when-mapping.patch [bz#1095763 bz#1096124]
- kvm-virtio-allow-mapping-up-to-max-queue-size.patch [bz#1095763 bz#1096124]
- kvm-enable-PCI-multiple-segments-for-pass-through-device.patch [bz#1099941]
- kvm-virtio-net-fix-buffer-overflow-on-invalid-state-load.patch [bz#1095675]
- kvm-virtio-validate-config_len-on-load.patch [bz#1095779]
- kvm-usb-fix-up-post-load-checks.patch [bz#1096825]
- kvm-CPU-hotplug-use-apic_id_for_cpu-round-2-RHEL-6-only.patch [bz#1100575]
- Resolves: bz#1095675
()
- Resolves: bz#1095692
()
- Resolves: bz#1095735
()
- Resolves: bz#1095739
()
- Resolves: bz#1095743
()
- Resolves: bz#1095763
()
- Resolves: bz#1095779
()
- Resolves: bz#1096124
()
- Resolves: bz#1096825
()
- Resolves: bz#1099941
()
- Resolves: bz#1100575
(Some vCPU topologies not accepted by libvirt)

[0.12.1.2-2.415.el6_5.9]
- kvm-ide-Correct-improper-smart-self-test-counter-reset-i.patch [bz#1087978]
- Resolves: bz#1087978
(CVE-2014-2894 qemu-kvm: QEMU: out of bounds buffer accesses, guest triggerable via IDE SMART [rhel-6.5.z])

Affected Software/OS:
'qemu-kvm' package(s) on Oracle Linux 6.

Solution:
Please install the updated package(s).

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2013-4148
FEDORA-2014-6288
http://lists.fedoraproject.org/pipermail/package-announce/2014-May/133345.html
RHSA-2014:0743
http://rhn.redhat.com/errata/RHSA-2014-0743.html
RHSA-2014:0744
http://rhn.redhat.com/errata/RHSA-2014-0744.html
[Qemu-stable] 20140723 [ANNOUNCE] QEMU 1.7.2 Stable released
http://lists.nongnu.org/archive/html/qemu-stable/2014-07/msg00187.html
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=71f7fe48e10a8437c9d42d859389f37157f59980
Common Vulnerability Exposure (CVE) ID: CVE-2013-4151
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=cc45995294b92d95319b4782750a3580cabdbc0c
Common Vulnerability Exposure (CVE) ID: CVE-2013-4535
http://git.qemu.org/?p=qemu.git;a=commitdiff;h=36cf2a37132c7f01fa9adb5f95f5312b27742fd4
https://bugzilla.redhat.com/show_bug.cgi?id=1066401
Common Vulnerability Exposure (CVE) ID: CVE-2013-4536
Common Vulnerability Exposure (CVE) ID: CVE-2013-4541
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=9f8e9895c504149d7048e9fc5eb5cbb34b16e49a
Common Vulnerability Exposure (CVE) ID: CVE-2013-4542
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=3c3ce981423e0d6c18af82ee62f1850c2cda5976
Common Vulnerability Exposure (CVE) ID: CVE-2013-6399
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=4b53c2c72cb5541cf394033b528a6fe2a86c0ac1
Common Vulnerability Exposure (CVE) ID: CVE-2014-0182
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=a890a2f9137ac3cf5b607649e66a6f3a5512d8dc
Common Vulnerability Exposure (CVE) ID: CVE-2014-2894
57945
http://secunia.com/advisories/57945
58191
http://secunia.com/advisories/58191
66932
http://www.securityfocus.com/bid/66932
RHSA-2014:0704
http://rhn.redhat.com/errata/RHSA-2014-0704.html
USN-2182-1
http://www.ubuntu.com/usn/USN-2182-1
[Qemu-devel] 20140412 [PATCH for 2.0] ide: Correct improper smart self test c
https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02016.html
[Qemu-devel] 20140414 Re: [PATCH for 2.0] ide: Correct improper smart self test c
https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02095.html
https://lists.nongnu.org/archive/html/qemu-devel/2014-04/msg02152.html
[oss-security] 20140415 CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART
http://www.openwall.com/lists/oss-security/2014/04/15/4
[oss-security] 20140418 Re: CVE request Qemu: out of bounds buffer access, guest triggerable via IDE SMART
http://www.openwall.com/lists/oss-security/2014/04/18/5
Common Vulnerability Exposure (CVE) ID: CVE-2014-3461
FEDORA-2014-6970
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134053.html
[qemu-devel] 20140512 [PATCH] usb: fix up post load checks
http://article.gmane.org/gmane.comp.emulators.qemu/272092
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.