Rapid7 Vulnerability & Exploit Database

RHSA-2016:0083: qemu-kvm security and bug fix update

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

RHSA-2016:0083: qemu-kvm security and bug fix update

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
01/28/2016
Created
07/25/2018
Added
01/29/2016
Modified
10/30/2017

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides theuser-space component for running virtual machines using KVM.An out-of-bounds read/write flaw was discovered in the way QEMU's FirmwareConfiguration device emulation processed certain firmware configurations.A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash theQEMU process instance or, potentially, execute arbitrary code on the hostwith privileges of the QEMU process. (CVE-2016-1714)Red Hat would like to thank Donghai Zhu of Alibaba for reporting thisissue.This update also fixes the following bugs:All qemu-kvm users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing thisupdate, shut down all running virtual machines. Once all virtual machineshave shut down, start them again for this update to take effect.

Solution(s)

  • redhat-upgrade-libcacard
  • redhat-upgrade-libcacard-devel
  • redhat-upgrade-libcacard-tools
  • redhat-upgrade-qemu-img
  • redhat-upgrade-qemu-kvm
  • redhat-upgrade-qemu-kvm-common
  • redhat-upgrade-qemu-kvm-debuginfo
  • redhat-upgrade-qemu-kvm-tools

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;