Rapid7 Vulnerability & Exploit Database

RHSA-2011:0028: kvm security and bug fix update

Back to Search

RHSA-2011:0028: kvm security and bug fix update

Severity
2
CVSS
(AV:L/AC:M/Au:N/C:P/I:N/A:N)
Published
01/10/2011
Created
07/25/2018
Added
01/13/2011
Modified
07/04/2017

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built forthe standard Red Hat Enterprise Linux kernel.A data structure field in kvm_vcpu_ioctl_x86_get_vcpu_events() in QEMU-KVMwas not initialized properly before being copied to user-space. Aprivileged host user with access to "/dev/kvm" could use this flaw to leakkernel stack memory to user-space. (CVE-2010-4525)Red Hat would like to thank Stephan Mueller of atsec information securityfor reporting this issue.These updated packages also fix several bugs. Documentation for these bugfixes will be available shortly in the "kvm" section of the Red HatEnterprise Linux 5.6 Technical Notes, linked to in the References.All KVM users should upgrade to these updated packages, which resolve thisissue as well as fixing the bugs noted in the Technical Notes. Note: Theprocedure in the Solution section must be performed before this update willtake effect.

Solution(s)

  • redhat-upgrade-kmod-kvm
  • redhat-upgrade-kmod-kvm-debug
  • redhat-upgrade-kvm
  • redhat-upgrade-kvm-qemu-img
  • redhat-upgrade-kvm-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;