Rapid7 Vulnerability & Exploit Database

RHSA-2011:0534: qemu-kvm security, bug fix, and enhancement update

Back to Search

RHSA-2011:0534: qemu-kvm security, bug fix, and enhancement update

Severity
7
CVSS
(AV:A/AC:M/Au:S/C:C/I:C/A:C)
Published
05/19/2011
Created
07/25/2018
Added
06/02/2011
Modified
07/04/2017

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. qemu-kvm is the user-space componentfor running virtual machines using KVM.It was found that the virtio-blk driver in qemu-kvm did not properlyvalidate read and write requests from guests. A privileged guest user coulduse this flaw to crash the guest or, possibly, execute arbitrary code onthe host. (CVE-2011-1750)It was found that the PIIX4 Power Management emulation layer in qemu-kvmdid not properly check for hot plug eligibility during device removals. Aprivileged guest user could use this flaw to crash the guest or, possibly,execute arbitrary code on the host. (CVE-2011-1751)Red Hat would like to thank Nelson Elhage for reporting CVE-2011-1751.This update also fixes several bugs and adds various enhancements.Documentation for these bug fixes and enhancements will be availableshortly from the Technical Notes document, linked to in the Referencessection.All users of qemu-kvm should upgrade to these updated packages, whichcontain backported patches to resolve these issues, and fix the bugs andadd the enhancements noted in the Technical Notes. After installing thisupdate, shut down all running virtual machines. Once all virtual machineshave shut down, start them again for this update to take effect.

Solution(s)

  • redhat-upgrade-qemu-img
  • redhat-upgrade-qemu-kvm
  • redhat-upgrade-qemu-kvm-debuginfo
  • redhat-upgrade-qemu-kvm-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;