[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2018:1660-01 -- Redhat qemu-kvm, qemu-guest-agent

ID: oval:org.secpod.oval:def:502296Date: (C)2018-05-22   (M)2024-02-19
Class: PATCHFamily: unix




Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Security Fix: * An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of Load & Store instructions . It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory read from address to which a recent memory write has occurred may see an older value and subsequently cause an update into the microprocessor"s data cache even for speculatively executed instructions that never actually commit . As a result, an unprivileged attacker could use this flaw to read privileged memory by conducting targeted cache side-channel attacks. Note: This is the qemu-kvm side of the CVE-2018-3639 mitigation. Red Hat would like to thank Ken Johnson and Jann Horn for reporting this issue.

Platform:
Red Hat Enterprise Linux 6
Product:
qemu-kvm
qemu-guest-agent
Reference:
RHSA-2018:1660-01
CVE-2018-3639
CVE    1
CVE-2018-3639
CPE    3
cpe:/a:kvm_group:qemu-kvm
cpe:/o:redhat:enterprise_linux:6
cpe:/a:kvm_group:qemu_guest_agent

© SecPod Technologies