[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256488

 
 

909

 
 

199193

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2024:2962 -- Redhat seabios, sgabios, virt-v2v, hivex, libguestfs, libiscsi, libnbd, libtpms, libvirt, nbdkit, netcf, perl-Sys-Virt, qemu-kvm, supermin, swtpm, SLOF, seavgabios-bin, lua-guestfs, nbdfuse, perl-Sys-Guestfs, perl-hivex, python3-hivex, python3-libguestfs, python3-libnbd, python3-libvirt, qemu-guest-agent, qemu-img, ruby-hivex, ruby-libguestfs, virt-dib

ID: oval:org.secpod.oval:def:509336Date: (C)2024-05-24   (M)2024-05-29
Class: PATCHFamily: unix




Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Security Fix: QEMU: VNC: infinite loop in inflate_buffer leads to denial of service QEMU: improper IDE controller reset can lead to MBR overwrite QEMU: VNC: NULL pointer dereference in qemu_clipboard_request QEMU: virtio-net: stack buffer overflow in virtio_net_flush_tx For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Additional Changes: For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.10 Release Notes linked from the References section.

Platform:
Red Hat Enterprise Linux 8
Product:
seabios
sgabios
virt-v2v
hivex
libguestfs
libiscsi
libnbd
libtpms
libvirt
nbdkit
netcf
perl-Sys-Virt
qemu-kvm
supermin
swtpm
SLOF
seavgabios-bin
lua-guestfs
nbdfuse
perl-Sys-Guestfs
perl-hivex
python3-hivex
python3-libguestfs
python3-libnbd
python3-libvirt
qemu-guest-agent
qemu-img
ruby-hivex
ruby-libguestfs
virt-dib
Reference:
RHSA-2024:2962
CVE-2023-3255
CVE-2023-5088
CVE-2023-6683
CVE-2023-6693
CVE    4
CVE-2023-3255
CVE-2023-5088
CVE-2023-6693
CVE-2023-6683
...

© SecPod Technologies