Updated qemu-kvm-rhev packages that fix one security issue are nowavailable for Red Hat Enterprise Linux OpenStack Platform 5.0 for Red HatEnterprise Linux 7.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution forLinux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides theuser-space component for running virtual machines using KVM, inenvironments managed by Red Hat Enterprise Linux OpenStack Platform.It was found that the Cirrus blit region checks were insufficient.A privileged guest user could use this flaw to write outside ofVRAM-allocated buffer boundaries in the host’s QEMU process address spacewith attacker-provided data. (CVE-2014-8106)This issue was discovered by Paolo Bonzini of Red Hat.All users of qemu-kvm-rhev are advised to upgrade to these updatedpackages, which contain a backported patch to correct this issue. Afterinstalling this update, shut down all running virtual machines. Once allvirtual machines have shut down, start them again for this update to takeeffect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat OpenStack 5.0 for RHEL 7

    MD5: 238f937be45b62b9774add5b83d852d8SHA-256: c594efa46171e7a9bf4704341d6ac4ed0cfee6a9869ba0532d66df2b150da19f
    MD5: 502cd96034f9fb903995c3ef8da97c19SHA-256: 100fe20ccf4ece20a1b1aef58b439178d1f7be5bd0dbe532db41ee3090ef7b9e
    MD5: 2efd1af75925f7b9341d2598e1290711SHA-256: f30705eece366decce92ecdbee961a0c3c5e0de10427e5ad31c694699655b843
    MD5: 1e9fb07ee6b16d237d508bec85a625cfSHA-256: 2c4332890b205380956bfb1f4b69575ab7d991950352045f2307d15358731ac8
    MD5: 8413b49536d5e226b80d93e1f0087548SHA-256: 2bc3a76cfaf01ecf0b0f1d98fb180e35dda7aae959c10d7a92b0c02be70df1d6
    MD5: 96f80c1e78ff1d74b8ef91dd659362cbSHA-256: 0241ae3754269deda9abebbb14afac843c6cac01e60be472c0e0ab6d32700f6f
    MD5: 89910d88c9a0b5da06233616252a938bSHA-256: 50c9a9fba65f725dd15bebfe7b1d3fcdd5396bbe019f09b409e2134d8857ae0e
    MD5: 04a80712b9663ff035483e7ca8a20c09SHA-256: e8d820f17f86238b6377984fc70abc5fcdf3f8777c7afc231c3099b5c5ca7591
    MD5: e3b44f7614db142757687c6002ed4b31SHA-256: c9a9660bc4e35056b524647c51d4fdd9adfc23f842d59faadf4e4a8b90dd47fb
(The unlinked packages above are only available from the Red Hat Network)
1169454 – CVE-2014-8106 qemu: cirrus: insufficient blit region checks

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply