- Issued:
- 2016-08-24
- Updated:
- 2016-08-24
RHSA-2016:1763 - Moderate: qemu-kvm-rhev security update
Synopsis
Moderate: qemu-kvm-rhev security update
Type/Severity
Security Advisory Moderate
Topic
An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 9.0 (Mitaka).
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager.
Security Fix(es):
-
Quick Emulator(QEMU) built with the Block driver for iSCSI images support (virtio-blk) is vulnerable to a heap-based buffer overflow issue. The flaw could occur while processing iSCSI asynchronous I/O ioctl(2) calls. A user inside a guest could exploit this flaw to crash the QEMU process resulting in denial of service, or potentially leverage it to execute arbitrary code with QEMU-process privileges on the host. (CVE-2016-5126)
-
Quick Emulator(QEMU) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement results in unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403)
Red Hat would like to thank hongzhenhao (Marvel Team) for reporting CVE-2016-5403.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat OpenStack | 9 | x86_64 |
Updated Packages
- libcacard-rhev-2.3.0-31.el7_2.21.x86_64.rpm
- libcacard-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm
- qemu-kvm-rhev-debuginfo-2.3.0-31.el7_2.21.x86_64.rpm
- qemu-kvm-tools-rhev-2.3.0-31.el7_2.21.x86_64.rpm
- qemu-kvm-common-rhev-2.3.0-31.el7_2.21.x86_64.rpm
- qemu-kvm-rhev-2.3.0-31.el7_2.21.x86_64.rpm
- qemu-kvm-rhev-2.3.0-31.el7_2.21.src.rpm
- qemu-img-rhev-2.3.0-31.el7_2.21.x86_64.rpm
Fixes
CVEs
References
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.