Rapid7 Vulnerability & Exploit Database

RHSA-2012:0149: kvm security and bug fix update

Back to Search

RHSA-2012:0149: kvm security and bug fix update

Severity
4
CVSS
(AV:L/AC:H/Au:N/C:N/I:N/A:C)
Published
02/21/2012
Created
07/25/2018
Added
02/21/2012
Modified
07/04/2017

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built forthe standard Red Hat Enterprise Linux kernel.It was found that the kvm_vm_ioctl_assign_device() function in the KVMsubsystem of a Linux kernel did not check if the user requesting deviceassignment was privileged or not. A member of the kvm group on the hostcould assign unused PCI devices, or even devices that were in use andwhose resources were not properly claimed by the respective drivers, whichcould result in the host crashing. (CVE-2011-4347)Red Hat would like to thank Sasha Levin for reporting this issue.These updated kvm packages include several bug fixes. Space precludesdocumenting all of these changes in this advisory. Users are directed tothe Red Hat Enterprise Linux 5.8 Technical Notes, linked to in theReferences, for information on the most significant of these changes.All KVM users should upgrade to these updated packages, which containbackported patches to correct these issues. Note: The procedure in theSolution section must be performed before this update will take effect.

Solution(s)

  • redhat-upgrade-kmod-kvm
  • redhat-upgrade-kmod-kvm-debug
  • redhat-upgrade-kvm
  • redhat-upgrade-kvm-debuginfo
  • redhat-upgrade-kvm-qemu-img
  • redhat-upgrade-kvm-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;