[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1907-1 kvm -- several vulnerabilities

ID: oval:org.secpod.oval:def:600250Date: (C)2011-05-13   (M)2024-02-19
Class: PATCHFamily: unix




Several vulnerabilities have been discovered in kvm, a full virtualization system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2008-5714 Chris Webb discovered an off-by-one bug limiting KVM"s VNC passwords to 7 characters. This flaw might make it easier for remote attackers to guess the VNC password, which is limited to seven characters where eight was intended. CVE-2009-3290 It was discovered that the kvm_emulate_hypercall function in KVM does not prevent access to MMU hypercalls from ring 0, which allows local guest OS users to cause a denial of service and read or write guest kernel memory. For the stable distribution , these problems have been fixed in version 72+dfsg-5~lenny3. The oldstable distribution does not contain kvm. For the testing distribution these problems will be fixed soon. For the unstable distribution these problems have been fixed in version 85+dfsg-4.1 We recommend that you upgrade your kvm packages.

Platform:
Debian 5.0
Product:
kvm
Reference:
DSA-1907-1
CVE-2008-5714
CVE-2009-3290
CVE    2
CVE-2008-5714
CVE-2009-3290
CPE    1
cpe:/o:debian:debian_linux:5.x

© SecPod Technologies