Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63053
Category:Fedora Local Security Checks
Title:Fedora Core 9 FEDORA-2008-11705 (kvm)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to kvm
announced via advisory FEDORA-2008-11705.

KVM (for Kernel-based Virtual Machine) is a full virtualization solution
for Linux on x86 hardware.

Using KVM, one can run multiple virtual machines running unmodified Linux
or Windows images. Each virtual machine has private virtualized hardware:
a network card, disk, graphics adapter, etc.

Update Information:

ChangeLog:

* Mon Dec 22 2008 Glauber Costa - 65-15.fc9
- Fixed CVE 2008-2382.
* Thu Dec 4 2008 Glauber Costa - 65-14.fc9
- Fixed bug that corrupted gnome-panel #474702
* Tue Dec 2 2008 Glauber Costa - 65-12.fc9
- Properly set flags for interrupt return #464304
* Tue Nov 11 2008 Glauber Costa - 65-11.fc9
- Fix CVE-2008-4539 #448525

References:

[ 1 ] Bug #477636 - CVE-2008-2382 qemu/kvm: remote DoS (infinite loop) via specially-crafted VNC message received by the domain
https://bugzilla.redhat.com/show_bug.cgi?id=477636
[ 2 ] Bug #466890 - CVE-2008-4539 kvm/qemu/xen: Incomplete upstream fix for CVE-2007-1320
https://bugzilla.redhat.com/show_bug.cgi?id=466890

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update kvm' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-11705

Risk factor : High

CVSS Score:
7.2

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-4539
Debian Security Information: DSA-1799 (Google Search)
http://www.debian.org/security/2009/dsa-1799
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
http://www.mail-archive.com/cvs-all@freebsd.org/msg129730.html
http://groups.google.com/group/linux.debian.changes.devel/msg/9e0dc008572f2867?dmode=source
http://www.mail-archive.com/secure-testing-commits@lists.alioth.debian.org/msg09322.html
http://secunia.com/advisories/25073
http://secunia.com/advisories/29129
http://secunia.com/advisories/33350
http://secunia.com/advisories/34642
http://secunia.com/advisories/35031
http://secunia.com/advisories/35062
SuSE Security Announcement: SUSE-SR:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://www.ubuntu.com/usn/usn-776-1
XForce ISS Database: qemu-kvm-cirrusvga-bo(47736)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47736
Common Vulnerability Exposure (CVE) ID: CVE-2008-2382
BugTraq ID: 32910
http://www.securityfocus.com/bid/32910
Bugtraq: 20081222 CORE-2008-1210: Qemu and KVM VNC server remote DoS (Google Search)
http://www.securityfocus.com/archive/1/499502/100/0/threaded
http://www.coresecurity.com/content/vnc-remote-dos
http://securitytracker.com/id?1021488
http://securitytracker.com/id?1021489
http://secunia.com/advisories/33293
http://secunia.com/advisories/33303
http://secunia.com/advisories/33568
http://securityreason.com/securityalert/4803
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.vupen.com/english/advisories/2008/3488
http://www.vupen.com/english/advisories/2008/3489
XForce ISS Database: qemu-kvm-protocolclientmsg-dos(47561)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47561
Common Vulnerability Exposure (CVE) ID: CVE-2007-1320
BugTraq ID: 23731
http://www.securityfocus.com/bid/23731
Debian Security Information: DSA-1284 (Google Search)
http://www.debian.org/security/2007/dsa-1284
Debian Security Information: DSA-1384 (Google Search)
http://www.debian.org/security/2007/dsa-1384
https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00082.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00706.html
https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00935.html
http://www.mandriva.com/security/advisories?name=MDKSA-2007:203
http://www.mandriva.com/security/advisories?name=MDVSA-2008:162
http://taviso.decsystem.org/virtsec.pdf
http://osvdb.org/35494
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10315
http://www.redhat.com/support/errata/RHSA-2007-0323.html
http://secunia.com/advisories/25095
http://secunia.com/advisories/27047
http://secunia.com/advisories/27085
http://secunia.com/advisories/27103
http://secunia.com/advisories/27486
http://secunia.com/advisories/30413
http://www.vupen.com/english/advisories/2007/1597
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.