qemu-kvm-0.12.1.2-2.160.AXS4.8
エラータID: AXSA:2011-600:02
KVM (for Kernel-based Virtual Machine) is a full virtualization solution for Linux on x86 hardware.
Using KVM, one can run multiple virtual machines running unmodified Linux or Windows images. Each virtual machine has private virtualized hardware: a network card, disk, graphics adapter, etc.
Security issues fixed with this release:
CVE-2011-1750
CVE-2011-1751
CVE-2011-2212
CVE-2011-2512
No description available at the time of writing, please use the CVE links below.
Fixed bugs:
- If a guest system had more than 4 GB of memory, the host kernel's vhost module might not have a complete view of the guest system's memory. This could result in a hot plugged vhost-net network device not working after restarting the guest. This has been fixed.
Update packages.
Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.
The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."
Buffer overflow in the virtio subsystem in qemu-kvm 0.14.0 and earlier allows privileged guest users to cause a denial of service (guest crash) or gain privileges via a crafted indirect descriptor related to "virtqueue in and out requests."
The virtio_queue_notify in qemu-kvm 0.14.0 and earlier does not properly validate the virtqueue number, which allows guest users to cause a denial of service (guest crash) and possibly execute arbitrary code via a negative number in the Queue Notify field of the Virtio Header, which bypasses a signed comparison.
From Asianux Server 4 SP1.
SRPMS
- qemu-kvm-0.12.1.2-2.160.AXS4.8.src.rpm
MD5: 974892d92b10bb869f5d384f142f67c4
SHA-256: c9b51b36f5fe266129cfafecd631257b3851cf7295a47dfaa1d04ddd2a47b8ac
Size: 6.14 MB
Asianux Server 4 for x86_64
- qemu-kvm-0.12.1.2-2.160.AXS4.8.x86_64.rpm
MD5: 1f1b57dd8a27d631cf697b58e65ed138
SHA-256: a5c7687a4f375c9e1734a6a56f457228abdfb59c6c965ab25def97cd001ebd2a
Size: 1.04 MB - qemu-img-0.12.1.2-2.160.AXS4.8.x86_64.rpm
MD5: 7ecda88c45eefa399bd47124825ed564
SHA-256: 1293a724cd335333a3c412c1f653d700318f65eaa5483a0047697cec879c3285
Size: 262.93 kB - qemu-kvm-tools-0.12.1.2-2.160.AXS4.8.x86_64.rpm
MD5: 394050cfeaf397740775741862e2cf28
SHA-256: f2255c7bcd7831d95fe79c250e5519ee8b8174bff872eca4ab8e40840029477b
Size: 124.68 kB