Rapid7 Vulnerability & Exploit Database

RHSA-2011:1531: qemu-kvm security, bug fix, and enhancement update

Back to Search

RHSA-2011:1531: qemu-kvm security, bug fix, and enhancement update

Severity
2
CVSS
(AV:L/AC:L/Au:N/C:P/I:N/A:N)
Published
12/06/2011
Created
07/25/2018
Added
12/16/2011
Modified
07/04/2017

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. qemu-kvm is the user-space componentfor running virtual machines using KVM.It was found that qemu-kvm did not properly drop supplemental groupprivileges when the root user started guests from the command line("/usr/libexec/qemu-kvm") with the "-runas" option. A qemu-kvm processstarted this way could use this flaw to gain access to files on the hostthat are accessible to the supplementary groups and not accessible to theprimary group. (CVE-2011-2527)Note: This issue only affected qemu-kvm when it was started directly fromthe command line. It did not affect the Red Hat Enterprise Virtualizationplatform or applications that start qemu-kvm via libvirt, such as theVirtual Machine Manager (virt-manager).This update also fixes several bugs and adds various enhancements.Documentation for these bug fixes and enhancements will be availableshortly from the Technical Notes document, linked to in the Referencessection.All users of qemu-kvm are advised to upgrade to these updated packages,which contain backported patches to correct these issues and add theseenhancements. After installing this update, shut down all running virtualmachines. Once all virtual machines have shut down, start them again forthis update to take effect.

Solution(s)

  • redhat-upgrade-qemu-img
  • redhat-upgrade-qemu-kvm
  • redhat-upgrade-qemu-kvm-debuginfo
  • redhat-upgrade-qemu-kvm-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;