Security Advisory Moderate: qemu-kvm-rhev security update

Advisory: RHSA-2015:1674-1
Type: Security Advisory
Severity: Moderate
Issued on: 2015-08-24
Last updated on: 2015-08-24
Affected Products: Red Hat OpenStack 6.0 for RHEL 7
CVEs (cve.mitre.org): CVE-2015-5165

Details

Updated qemu-kvm-rhev packages that fix two security issues are now
available for Red Hat Enterprise Linux OpenStack Platform 6.

Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the
user-space component for running virtual machines using KVM.

Qemu emulator built with the RTL8139 emulation support is vulnerable to an
information leakage flaw, while processing network packets under RTL8139
controller's C+ mode of operation. A guest user could use this flaw to read
upto 65KB of uninitialised Qemu heap memory. (CVE-2015-5165)

Red Hat would like to thank the Xen project for reporting this issue.
Upstream acknowledges Donghai Zhu of Alibaba as the original reporter.

All qemu-kvm-rhev users are advised to upgrade to these updated packages,
which contain a backported patch to correct this issue. After installing
this update, shut down all running virtual machines. Once all virtual
machines have shut down, start them again for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Updated packages

Red Hat OpenStack 6.0 for RHEL 7

SRPMS:
qemu-kvm-rhev-2.1.2-23.el7_1.8.src.rpm
File outdated by:  RHSA-2017:0981
    MD5: 3b0b92d662fbcac782980c1acdc8cff3
SHA-256: 5a204ee8b4b5a840b889b5685a06fe20d3febf7770706c68af4398bb10636657
 
x86_64:
libcacard-devel-rhev-2.1.2-23.el7_1.8.x86_64.rpm
File outdated by:  RHSA-2016:1654
    MD5: 0b17c120646768048cc3c481097afb35
SHA-256: a948204698ff24306291d63c0b08d592ea802e355e3063d863f67e3818c1de1f
libcacard-rhev-2.1.2-23.el7_1.8.x86_64.rpm
File outdated by:  RHSA-2016:1654
    MD5: d513a4c986bdd5aba1c2a2ae3aca8212
SHA-256: 0a27a6c89cf60a196f08df3f59ed181339de8a31dd4ac4b24516a28a0b0d5912
libcacard-tools-rhev-2.1.2-23.el7_1.8.x86_64.rpm
File outdated by:  RHSA-2016:1654
    MD5: 80f3636b437a7563ba07a1b97da36eee
SHA-256: 665d62e42cb6ee748b97c3649117429943a358707522f3c99a9544df6f6b3e0e
qemu-img-rhev-2.1.2-23.el7_1.8.x86_64.rpm
File outdated by:  RHSA-2017:0981
    MD5: 9464c920c09f9088442972f9d1b8eb69
SHA-256: 051eccb864d190d82659648022cf40b209189f6fbc4eaab16e1995873da90278
qemu-kvm-common-rhev-2.1.2-23.el7_1.8.x86_64.rpm
File outdated by:  RHSA-2017:0981
    MD5: 6ae8f9fbc1a65b708883659ec44ee5ba
SHA-256: 178d382a01e65cf82403acf68950c2bd99af3f19e3a6e2c0c371bfb5866628fa
qemu-kvm-rhev-2.1.2-23.el7_1.8.x86_64.rpm
File outdated by:  RHSA-2017:0981
    MD5: 772225f803a0e86ccfae162678505c6e
SHA-256: f7206fd580793b77fc7a616f4452de6d632112364a2b12356c594bbf728ef8f2
qemu-kvm-rhev-debuginfo-2.1.2-23.el7_1.8.x86_64.rpm
File outdated by:  RHSA-2017:0981
    MD5: 11064a5d465e5ad6966202bc3d24d35c
SHA-256: a6df340ae207b44ae626eaa5c26ff7fac095b7b6d13ad8a6bc495a7891a29f39
qemu-kvm-tools-rhev-2.1.2-23.el7_1.8.x86_64.rpm
File outdated by:  RHSA-2017:0981
    MD5: f92840880c7cbacea4da7a236afa3348
SHA-256: 30997759df8a254416674aba102325854447f63f1949fc7a15f7d20ef8a6ccfc
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1248760 - CVE-2015-5165 Qemu: rtl8139 uninitialized heap memory information leakage to guest (XSA-140)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/