Rapid7 Vulnerability & Exploit Database

RHSA-2010:0126: kvm security and bug fix update

Back to Search

RHSA-2010:0126: kvm security and bug fix update

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:N/I:N/A:C)
Published
10/30/2009
Created
07/25/2018
Added
03/11/2010
Modified
07/04/2017

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built forthe standard Red Hat Enterprise Linux kernel.A flaw was found in the way the x86 emulator loaded segment selectors (usedfor memory segmentation and protection) into segment registers. In someguest system configurations, an unprivileged guest user could leverage thisflaw to crash the guest or possibly escalate their privileges within theguest. (CVE-2010-0419)The x86 emulator implementation was missing a check for the CurrentPrivilege Level (CPL) while accessing debug registers. An unprivilegeduser in a guest could leverage this flaw to crash the guest.(CVE-2009-3722)This update also fixes the following bugs:With Red Hat Enterprise Virtualization, the virtio_blk_dma_restart_bh()function was previously used to handle write errors; however, a bug fixprovided by the RHSA-2009:1659 update meant that read errors would alsohave to be handled by this function. The function was not updated for this,causing read errors to be resubmitted as writes. This caused guest imagecorruption in some cases.Additionally, the return values of the bdrv_aio_write() and bdrv_aio_read()functions were ignored. If an immediate failure occurred in one of thesefunctions, errors would be missed and the guest could hang or readcorrupted data. (BZ#562776)All KVM users should upgrade to these updated packages, which containbackported patches to resolve these issues. Note: The procedure in theSolution section must be performed before this update will take effect.

Solution(s)

  • redhat-upgrade-kmod-kvm
  • redhat-upgrade-kvm
  • redhat-upgrade-kvm-qemu-img
  • redhat-upgrade-kvm-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;