Updated qemu-kvm packages that fix one security issue and one bug are nowavailable for Red Hat Enterprise Linux 7.Red Hat Product Security has rated this update as having Low securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. The qemu-kvm package provides theuser-space component for running virtual machines using KVM.An information leak flaw was found in the way QEMU’s VGA emulator accessedframe buffer memory for high resolution displays. A privileged guest usercould use this flaw to leak memory contents of the host to the guest bysetting the display to use a high resolution in the guest. (CVE-2014-3615)This issue was discovered by Laszlo Ersek of Red Hat.This update also fixes the following bug:* This update fixes a regression in the scsi_block_new_request() function,which caused all read requests to through SG_IO if the host cache was notused. (BZ#1141189)All qemu-kvm users are advised to upgrade to these updated packages, whichcontain backported patches to correct these issues. After installing thisupdate, shut down all running virtual machines. Once all virtual machineshave shut down, start them again for this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7)

SRPMS:
qemu-kvm-1.5.3-60.el7_0.10.src.rpm
    MD5: 08951b19b58e9308d4587199e310907eSHA-256: 24fe758d20a034991f0061e125f7506d7f3e55a6d300c4876111e8e8b3cae227
 
x86_64:
libcacard-1.5.3-60.el7_0.10.i686.rpm
    MD5: c9da53cfb805fc407204f415fd9467e1SHA-256: ecc9293fb459fb0bb2d744acc3a8d95ec9d8a0eb4bb71eae7738983a2a73eb37
libcacard-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 0e6ef06799c51f05f478a06b09f8955bSHA-256: cb131c75e827c2a1813b4dbda9632133cfa30596cb9024cf4b32bd368a1bbc37
libcacard-devel-1.5.3-60.el7_0.10.i686.rpm
    MD5: cc0e95cda7bfd3ffdf914b045370a796SHA-256: 0112cfd1e83fc22ea82e5b537c41cbafec60418c62edb6bdf91c517fa3c91986
libcacard-devel-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: dbc67a0c9685e8f1acc8179667965916SHA-256: 599d028e5f21ea0bbad0c1c4eec5298244cc3daddf7be5ca136c40cf3cc7a68d
libcacard-tools-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 566b662e2f0d4a0155d695dcd71b6426SHA-256: fe6532309c39de99dd52f3d7a59eaf824e634c25f0e88fc598d5cd671e5f9b27
qemu-guest-agent-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 3c0ffc8198ffc7ebdb75790523d0b4c0SHA-256: 7acbfd8d57497af547824356ab11d317c3957f2482e3697977a63b51a5cbc16b
qemu-img-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 1b7dcbfba4273192c9cca9299adf3601SHA-256: e3b1635ea47a5354eb4c886457501d983e8c5dd0a7b2b6892a4958cb3c85d924
qemu-kvm-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 07331dcb75fc26305a4d6da61bbbdaf7SHA-256: 5ee0a1092654e785afa3939c97d9c03a39d0eccbc2d3775f3ffbd0fa98329900
qemu-kvm-common-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 2995a70fa989758efdd550042979db5bSHA-256: f62b58fc94febe7ffa8172d3da5c6bc287a81383681e0bd00455448809677696
qemu-kvm-debuginfo-1.5.3-60.el7_0.10.i686.rpm
    MD5: e43421ddbfbf008f02e187cdcea575b9SHA-256: d6603c77757da40afb6b48fa7f27d90790595185f36adba2c4ab99de4cdb8a48
qemu-kvm-debuginfo-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 6a50068d643e84c5dff1768d9ec239c5SHA-256: d19554c9fa4c64d023c0921137a155d3f1c8b0f6ccd64c3c80bf45871c61fb11
qemu-kvm-tools-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 4b211455bea91fd495d5472bfdc7c222SHA-256: 0373d84822c676fdaeb8bd6dfe85357e087a14d602969b08eecac5d0c2616e3f
 
Red Hat Enterprise Linux HPC Node (v. 7)

SRPMS:
qemu-kvm-1.5.3-60.el7_0.10.src.rpm
    MD5: 08951b19b58e9308d4587199e310907eSHA-256: 24fe758d20a034991f0061e125f7506d7f3e55a6d300c4876111e8e8b3cae227
 
x86_64:
libcacard-1.5.3-60.el7_0.10.i686.rpm
    MD5: c9da53cfb805fc407204f415fd9467e1SHA-256: ecc9293fb459fb0bb2d744acc3a8d95ec9d8a0eb4bb71eae7738983a2a73eb37
libcacard-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 0e6ef06799c51f05f478a06b09f8955bSHA-256: cb131c75e827c2a1813b4dbda9632133cfa30596cb9024cf4b32bd368a1bbc37
libcacard-devel-1.5.3-60.el7_0.10.i686.rpm
    MD5: cc0e95cda7bfd3ffdf914b045370a796SHA-256: 0112cfd1e83fc22ea82e5b537c41cbafec60418c62edb6bdf91c517fa3c91986
libcacard-devel-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: dbc67a0c9685e8f1acc8179667965916SHA-256: 599d028e5f21ea0bbad0c1c4eec5298244cc3daddf7be5ca136c40cf3cc7a68d
libcacard-tools-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 566b662e2f0d4a0155d695dcd71b6426SHA-256: fe6532309c39de99dd52f3d7a59eaf824e634c25f0e88fc598d5cd671e5f9b27
qemu-guest-agent-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 3c0ffc8198ffc7ebdb75790523d0b4c0SHA-256: 7acbfd8d57497af547824356ab11d317c3957f2482e3697977a63b51a5cbc16b
qemu-img-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 1b7dcbfba4273192c9cca9299adf3601SHA-256: e3b1635ea47a5354eb4c886457501d983e8c5dd0a7b2b6892a4958cb3c85d924
qemu-kvm-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 07331dcb75fc26305a4d6da61bbbdaf7SHA-256: 5ee0a1092654e785afa3939c97d9c03a39d0eccbc2d3775f3ffbd0fa98329900
qemu-kvm-common-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 2995a70fa989758efdd550042979db5bSHA-256: f62b58fc94febe7ffa8172d3da5c6bc287a81383681e0bd00455448809677696
qemu-kvm-debuginfo-1.5.3-60.el7_0.10.i686.rpm
    MD5: e43421ddbfbf008f02e187cdcea575b9SHA-256: d6603c77757da40afb6b48fa7f27d90790595185f36adba2c4ab99de4cdb8a48
qemu-kvm-debuginfo-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 6a50068d643e84c5dff1768d9ec239c5SHA-256: d19554c9fa4c64d023c0921137a155d3f1c8b0f6ccd64c3c80bf45871c61fb11
qemu-kvm-tools-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 4b211455bea91fd495d5472bfdc7c222SHA-256: 0373d84822c676fdaeb8bd6dfe85357e087a14d602969b08eecac5d0c2616e3f
 
Red Hat Enterprise Linux Server (v. 7)

SRPMS:
qemu-kvm-1.5.3-60.el7_0.10.src.rpm
    MD5: 08951b19b58e9308d4587199e310907eSHA-256: 24fe758d20a034991f0061e125f7506d7f3e55a6d300c4876111e8e8b3cae227
 
x86_64:
libcacard-1.5.3-60.el7_0.10.i686.rpm
    MD5: c9da53cfb805fc407204f415fd9467e1SHA-256: ecc9293fb459fb0bb2d744acc3a8d95ec9d8a0eb4bb71eae7738983a2a73eb37
libcacard-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 0e6ef06799c51f05f478a06b09f8955bSHA-256: cb131c75e827c2a1813b4dbda9632133cfa30596cb9024cf4b32bd368a1bbc37
libcacard-devel-1.5.3-60.el7_0.10.i686.rpm
    MD5: cc0e95cda7bfd3ffdf914b045370a796SHA-256: 0112cfd1e83fc22ea82e5b537c41cbafec60418c62edb6bdf91c517fa3c91986
libcacard-devel-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: dbc67a0c9685e8f1acc8179667965916SHA-256: 599d028e5f21ea0bbad0c1c4eec5298244cc3daddf7be5ca136c40cf3cc7a68d
libcacard-tools-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 566b662e2f0d4a0155d695dcd71b6426SHA-256: fe6532309c39de99dd52f3d7a59eaf824e634c25f0e88fc598d5cd671e5f9b27
qemu-guest-agent-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 3c0ffc8198ffc7ebdb75790523d0b4c0SHA-256: 7acbfd8d57497af547824356ab11d317c3957f2482e3697977a63b51a5cbc16b
qemu-img-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 1b7dcbfba4273192c9cca9299adf3601SHA-256: e3b1635ea47a5354eb4c886457501d983e8c5dd0a7b2b6892a4958cb3c85d924
qemu-kvm-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 07331dcb75fc26305a4d6da61bbbdaf7SHA-256: 5ee0a1092654e785afa3939c97d9c03a39d0eccbc2d3775f3ffbd0fa98329900
qemu-kvm-common-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 2995a70fa989758efdd550042979db5bSHA-256: f62b58fc94febe7ffa8172d3da5c6bc287a81383681e0bd00455448809677696
qemu-kvm-debuginfo-1.5.3-60.el7_0.10.i686.rpm
    MD5: e43421ddbfbf008f02e187cdcea575b9SHA-256: d6603c77757da40afb6b48fa7f27d90790595185f36adba2c4ab99de4cdb8a48
qemu-kvm-debuginfo-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 6a50068d643e84c5dff1768d9ec239c5SHA-256: d19554c9fa4c64d023c0921137a155d3f1c8b0f6ccd64c3c80bf45871c61fb11
qemu-kvm-tools-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 4b211455bea91fd495d5472bfdc7c222SHA-256: 0373d84822c676fdaeb8bd6dfe85357e087a14d602969b08eecac5d0c2616e3f
 
Red Hat Enterprise Linux Workstation (v. 7)

SRPMS:
qemu-kvm-1.5.3-60.el7_0.10.src.rpm
    MD5: 08951b19b58e9308d4587199e310907eSHA-256: 24fe758d20a034991f0061e125f7506d7f3e55a6d300c4876111e8e8b3cae227
 
x86_64:
libcacard-1.5.3-60.el7_0.10.i686.rpm
    MD5: c9da53cfb805fc407204f415fd9467e1SHA-256: ecc9293fb459fb0bb2d744acc3a8d95ec9d8a0eb4bb71eae7738983a2a73eb37
libcacard-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 0e6ef06799c51f05f478a06b09f8955bSHA-256: cb131c75e827c2a1813b4dbda9632133cfa30596cb9024cf4b32bd368a1bbc37
libcacard-devel-1.5.3-60.el7_0.10.i686.rpm
    MD5: cc0e95cda7bfd3ffdf914b045370a796SHA-256: 0112cfd1e83fc22ea82e5b537c41cbafec60418c62edb6bdf91c517fa3c91986
libcacard-devel-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: dbc67a0c9685e8f1acc8179667965916SHA-256: 599d028e5f21ea0bbad0c1c4eec5298244cc3daddf7be5ca136c40cf3cc7a68d
libcacard-tools-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 566b662e2f0d4a0155d695dcd71b6426SHA-256: fe6532309c39de99dd52f3d7a59eaf824e634c25f0e88fc598d5cd671e5f9b27
qemu-guest-agent-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 3c0ffc8198ffc7ebdb75790523d0b4c0SHA-256: 7acbfd8d57497af547824356ab11d317c3957f2482e3697977a63b51a5cbc16b
qemu-img-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 1b7dcbfba4273192c9cca9299adf3601SHA-256: e3b1635ea47a5354eb4c886457501d983e8c5dd0a7b2b6892a4958cb3c85d924
qemu-kvm-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 07331dcb75fc26305a4d6da61bbbdaf7SHA-256: 5ee0a1092654e785afa3939c97d9c03a39d0eccbc2d3775f3ffbd0fa98329900
qemu-kvm-common-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 2995a70fa989758efdd550042979db5bSHA-256: f62b58fc94febe7ffa8172d3da5c6bc287a81383681e0bd00455448809677696
qemu-kvm-debuginfo-1.5.3-60.el7_0.10.i686.rpm
    MD5: e43421ddbfbf008f02e187cdcea575b9SHA-256: d6603c77757da40afb6b48fa7f27d90790595185f36adba2c4ab99de4cdb8a48
qemu-kvm-debuginfo-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 6a50068d643e84c5dff1768d9ec239c5SHA-256: d19554c9fa4c64d023c0921137a155d3f1c8b0f6ccd64c3c80bf45871c61fb11
qemu-kvm-tools-1.5.3-60.el7_0.10.x86_64.rpm
    MD5: 4b211455bea91fd495d5472bfdc7c222SHA-256: 0373d84822c676fdaeb8bd6dfe85357e087a14d602969b08eecac5d0c2616e3f
 
(The unlinked packages above are only available from the Red Hat Network)
1139115 – CVE-2014-3615 Qemu: information leakage when guest sets high resolution

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply