Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.63057
Category:Fedora Local Security Checks
Title:Fedora Core 10 FEDORA-2008-11727 (kvm)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to kvm
announced via advisory FEDORA-2008-11727.

KVM (for Kernel-based Virtual Machine) is a full virtualization solution
for Linux on x86 hardware.

Using KVM, one can run multiple virtual machines running unmodified Linux
or Windows images. Each virtual machine has private virtualized hardware:
a network card, disk, graphics adapter, etc.

Update Information:

ChangeLog:

* Mon Dec 22 2008 Glauber Costa - 74-10
- Fixed CVE 2008-2382.
* Thu Dec 4 2008 Glauber Costa - 74-9
- Fixed bug that corrupted gnome-panel #474703
* Tue Dec 2 2008 Glauber Costa - 74-8
- Properly set flags for interrupt return #474059
* Mon Nov 24 2008 Glauber Costa - 74-7
- added upstream patch kvm-restore-option-rom.patch - #470561
* Tue Nov 11 2008 Glauber Costa - 74-6
- Fix cirrus vulnerability (CVE-2008-4539) - #471055
References:

[ 1 ] Bug #477636 - CVE-2008-2382 qemu/kvm: remote DoS (infinite loop) via specially-crafted VNC message received by the domain
https://bugzilla.redhat.com/show_bug.cgi?id=477636

Solution: Apply the appropriate updates.

This update can be installed with the yum update program. Use
su -c 'yum update kvm' at the command line.
For more information, refer to Managing Software with yum,
available at http://docs.fedoraproject.org/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-11727

Risk factor : High

CVSS Score:
7.2

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2008-4539
Debian Security Information: DSA-1799 (Google Search)
http://www.debian.org/security/2009/dsa-1799
https://www.redhat.com/archives/fedora-package-announce/2008-December/msg01223.html
http://www.mail-archive.com/cvs-all@freebsd.org/msg129730.html
http://groups.google.com/group/linux.debian.changes.devel/msg/9e0dc008572f2867?dmode=source
http://www.mail-archive.com/secure-testing-commits@lists.alioth.debian.org/msg09322.html
http://secunia.com/advisories/25073
http://secunia.com/advisories/29129
http://secunia.com/advisories/33350
http://secunia.com/advisories/34642
http://secunia.com/advisories/35031
http://secunia.com/advisories/35062
SuSE Security Announcement: SUSE-SR:2009:008 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-04/msg00003.html
http://www.ubuntu.com/usn/usn-776-1
XForce ISS Database: qemu-kvm-cirrusvga-bo(47736)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47736
Common Vulnerability Exposure (CVE) ID: CVE-2008-2382
BugTraq ID: 32910
http://www.securityfocus.com/bid/32910
Bugtraq: 20081222 CORE-2008-1210: Qemu and KVM VNC server remote DoS (Google Search)
http://www.securityfocus.com/archive/1/499502/100/0/threaded
http://www.coresecurity.com/content/vnc-remote-dos
http://securitytracker.com/id?1021488
http://securitytracker.com/id?1021489
http://secunia.com/advisories/33293
http://secunia.com/advisories/33303
http://secunia.com/advisories/33568
http://securityreason.com/securityalert/4803
SuSE Security Announcement: SUSE-SR:2009:002 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2009-01/msg00004.html
http://www.vupen.com/english/advisories/2008/3488
http://www.vupen.com/english/advisories/2008/3489
XForce ISS Database: qemu-kvm-protocolclientmsg-dos(47561)
https://exchange.xforce.ibmcloud.com/vulnerabilities/47561
CopyrightCopyright (c) 2008 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.