Rapid7 Vulnerability & Exploit Database

RHSA-2011:1801: qemu-kvm security update

Back to Search

RHSA-2011:1801: qemu-kvm security update

Severity
7
CVSS
(AV:A/AC:H/Au:N/C:C/I:C/A:C)
Published
12/08/2011
Created
07/25/2018
Added
12/16/2011
Modified
07/04/2017

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. qemu-kvm is the user-space componentfor running virtual machines using KVM.A flaw was found in the way qemu-kvm handled VSC_ATR messages when a guestwas configured for a CCID (Chip/Smart Card Interface Devices) USB smartcard reader in passthrough mode. An attacker able to connect to the port onthe host being used for such a device could use this flaw to crash theqemu-kvm process on the host or, possibly, escalate their privileges on thehost. (CVE-2011-4111)All users of qemu-kvm should upgrade to these updated packages, whichcontain a backported patch to resolve this issue. After installing thisupdate, shut down all running virtual machines. Once all virtual machineshave shut down, start them again for this update to take effect.

Solution(s)

  • redhat-upgrade-qemu-img
  • redhat-upgrade-qemu-kvm
  • redhat-upgrade-qemu-kvm-debuginfo
  • redhat-upgrade-qemu-kvm-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;