kvm-83-164.21.0.1.AXS3
エラータID: AXSA:2010-424:03
KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware.
Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc.
Security issues fixed with this release:
CVE-2010-0431
CVE-2010-0435
CVE-2010-2784
No information available at the time of writing, see the links below.
Fixed bugs:
Fixed [kvm] qemu image check returns cluster errors when using virtIO block (thinly provisioned) during e_no_space events (along with EIO errors)
- kvm-qemu-img-check-Distinguish-different-kinds-of-errors.patch
- kvm-qcow2-Change-check-to-distinguish-error-cases.patch
Fixed SPICE - race in KVM/Spice would cause migration to fail (slots are not registered properly?))
- kvm-New-slots-need-dirty-tracking-enabled-when-migrating.patch
Fixed KVM uses wrong permissions for large guest pages
- kvm-kernel-KVM-MMU-fix-conflict-access-permissions-in-direct-sp.patch
Backported qcow2 fixes to RHEL 5)
- Renumber patches on spec file to avoid patch number conflicts between userspace & kernel patches
- kvm-qcow2-Fix-access-after-end-of-array.patch
- kvm-qcow2-Don-t-ignore-immediate-read-write-failures.patch
- kvm-qcow2-Return-0-errno-in-write_l2_entries.patch
- kvm-qcow2-Fix-error-return-code-in-qcow2_alloc_cluster_l.patch
- kvm-qcow2-Return-0-errno-in-write_l1_entry.patch
- kvm-qcow2-Return-0-errno-in-l2_allocate.patch
- kvm-qcow2-Allow-qcow2_get_cluster_offset-to-return-error.patch
- kvm-qcow2-Change-l2_load-to-return-0-errno.patch
- kvm-qcow2-Return-right-error-code-in-write_refcount_bloc.patch
- kvm-qcow2-Fix-corruption-after-error-in-update_refcount.patch
- kvm-qcow2-Clear-L2-table-cache-after-write-error.patch
- kvm-qcow2-Fix-error-handling-in-l2_allocate.patch
- kvm-qcow2-Restore-L1-entry-on-l2_allocate-failure.patch
- kvm-qcow2-Allow-get_refcount-to-return-errors.patch
- kvm-qcow2-Allow-alloc_clusters_noref-to-return-errors.patch
- kvm-qcow2-Return-real-error-code-in-load_refcount_block.patch
Fixed qcow2 image corruption when using cache=writeback
- kvm-block-Add-bdrv_-p-write_sync.patch
- kvm-qcow2-Use-bdrv_-p-write_sync-for-metadata-writes.patch
Fixed Excessive lseek() causes severe performance issues with vm disk images over NFS
- kvm-raw-posix-Use-pread-pwrite-instead-of-lseek-read-wri.patch
- kvm-block-Cache-total_sectors-to-reduce-bdrv_getlength-c.patch
Fixed Virtio: Transfer file caused guest in same vlan abnormally quit
- kvm-virtio-net-correct-packet-length-checks.patch
- kvm-virtio-net-truncating-packet.patch
Fixed [kvm] segmentation fault when running qemu-img check on faulty image
- kvm-qcow2-Fix-qemu-img-check-segfault-on-corrupted-image.patch
- kvm-qcow2-Don-t-try-to-check-tables-that-couldn-t-be-loa.patch
Fixed fork causing trouble for vcpu threads
- Updated kversion to 2.6.18-194.8.1.el5 to match build root
- kvm-kernel-KVM-Keep-slot-ID-in-memory-slot-structure.patch
- kvm-kernel-KVM-Prevent-internal-slots-from-being-COWed.patch
Fixed virtio-blk: Avoid zeroing every request structure
- kvm-virtio-blk.c-avoid-zero-every-request-structure.patch
Update packages.
QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly validate guest QXL driver pointers, which allows guest OS users to cause a denial of service (invalid pointer dereference and guest OS crash) or possibly gain privileges via unspecified vectors.
The Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2, and KVM 83, when the Intel VT-x extension is enabled, allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) via vectors related to instruction emulation.
The subpage MMIO initialization functionality in the subpage_register function in exec.c in QEMU-KVM, as used in the Hypervisor (aka rhev-hypervisor) in Red Hat Enterprise Virtualization (RHEV) 2.2 and KVM 83, does not properly select the index for access to the callback array, which allows guest OS users to cause a denial of service (guest OS crash) or possibly gain privileges via unspecified vectors.
N/A
SRPMS
- kvm-83-164.21.0.1.AXS3.src.rpm
MD5: 53c58363c8a4cb5eb0c829b176206043
SHA-256: a3698adec0cff564e2da50e691dce943006263670d223edf6c4468afa12a0f38
Size: 4.58 MB
Asianux Server 3 for x86_64
- kmod-kvm-83-164.21.0.1.AXS3.x86_64.rpm
MD5: 98481c111846a3b0fb8f48302a8933b3
SHA-256: 6534c748197b98ca009cd6ea0e068d2614f6a70e76b001b3a96ecf501f6aad9c
Size: 1.25 MB - kvm-83-164.21.0.1.AXS3.x86_64.rpm
MD5: a85fd59aa8e0deed93a80ea446b445a4
SHA-256: b4dfea7107526d5ffe00a690833321db5131405acc0b7c66bb24b74501475d21
Size: 865.55 kB - kvm-qemu-img-83-164.21.0.1.AXS3.x86_64.rpm
MD5: 2f1b9102e58fedb7991258a6be84fd14
SHA-256: 83151ae29cf26099102df3bb9a7340697ff9e2cee288af70287750860ae5ca1f
Size: 161.65 kB - kvm-tools-83-164.21.0.1.AXS3.x86_64.rpm
MD5: 28de62367c9e36ec054a207f015be6fc
SHA-256: 69705f3fef277e3d943da0e333e71900236284bc6340a25a12bf492a7d8279e5
Size: 169.06 kB