Red Hat Customer Portal

Skip to main content

Security Advisory Important: qemu-kvm security update

Advisory: RHSA-2016:0082-1
Type: Security Advisory
Severity: Important
Issued on: 2016-01-28
Last updated on: 2016-01-28
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.7.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2016-1714

Details

Updated qemu-kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the
user-space component for running virtual machines using KVM.

An out-of-bounds read/write flaw was discovered in the way QEMU's Firmware
Configuration device emulation processed certain firmware configurations.
A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the
QEMU process instance or, potentially, execute arbitrary code on the host
with privileges of the QEMU process. (CVE-2016-1714)

Red Hat would like to thank Donghai Zhu of Alibaba for reporting this
issue.

All qemu-kvm users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing this
update, shut down all running virtual machines. Once all virtual machines
have shut down, start them again for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm
File outdated by:  RHSA-2016:0997
    MD5: 2da85abdf9f54060403441108175a5f4
SHA-256: fb9daa323ceff2bb637a0e5abcb6a239a754ccacc0906711a196d1776b4269f1
 
IA-32:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.i686.rpm
File outdated by:  RHSA-2016:0997
    MD5: 37e2c09193d8f04378e53a10fcd3839c
SHA-256: f1a7f14a195fb0eabf35da050f52ab0ae7454f6ebb3f58eb33ab45a63cb2741d
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.i686.rpm
File outdated by:  RHSA-2016:0997
    MD5: a9a5f79f4578e962517f7fa42fd11122
SHA-256: 41c2c2b0784d6624441d75dcf9c09922b5350810ba40e04fcf1593c0263c30ec
 
x86_64:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 51063e3f3e7666a3d7dca52cddaec198
SHA-256: 6d8cf78420e0fc3d5ad3336ed8d62714ae187e35e667c485baa7fd316d28cb1e
qemu-img-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: f77576ea6a25a9f5dff621afc19330ee
SHA-256: 58793ee63e99494bbcd38e8f8932cfdb5ece4c1ab7ed5c3d862e962ec01c771a
qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: dd26512584c8229319bd16ece0d0da1a
SHA-256: 07439af3e0c378a8b04c20379bb50cda60993e3e3ee8ea60c26c89f7d0792a80
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 1ab03725aa0fa3f5298c2c7234dce197
SHA-256: d5465fc71e6db12ad28f9bca2ef8e51bef54740a99ecf872e043c2e9ba418f97
qemu-kvm-tools-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 25c673399bd1a8adf505ebee3ecb38fc
SHA-256: 59cb836032a2d9bd042f4e5a2773593fa948c4edd4d45a0ab6a2a530ba4345e0
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm
File outdated by:  RHSA-2016:0997
    MD5: 2da85abdf9f54060403441108175a5f4
SHA-256: fb9daa323ceff2bb637a0e5abcb6a239a754ccacc0906711a196d1776b4269f1
 
x86_64:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 51063e3f3e7666a3d7dca52cddaec198
SHA-256: 6d8cf78420e0fc3d5ad3336ed8d62714ae187e35e667c485baa7fd316d28cb1e
qemu-img-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: f77576ea6a25a9f5dff621afc19330ee
SHA-256: 58793ee63e99494bbcd38e8f8932cfdb5ece4c1ab7ed5c3d862e962ec01c771a
qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: dd26512584c8229319bd16ece0d0da1a
SHA-256: 07439af3e0c378a8b04c20379bb50cda60993e3e3ee8ea60c26c89f7d0792a80
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 1ab03725aa0fa3f5298c2c7234dce197
SHA-256: d5465fc71e6db12ad28f9bca2ef8e51bef54740a99ecf872e043c2e9ba418f97
qemu-kvm-tools-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 25c673399bd1a8adf505ebee3ecb38fc
SHA-256: 59cb836032a2d9bd042f4e5a2773593fa948c4edd4d45a0ab6a2a530ba4345e0
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm
File outdated by:  RHSA-2016:0997
    MD5: 2da85abdf9f54060403441108175a5f4
SHA-256: fb9daa323ceff2bb637a0e5abcb6a239a754ccacc0906711a196d1776b4269f1
 
IA-32:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.i686.rpm
File outdated by:  RHSA-2016:0997
    MD5: 37e2c09193d8f04378e53a10fcd3839c
SHA-256: f1a7f14a195fb0eabf35da050f52ab0ae7454f6ebb3f58eb33ab45a63cb2741d
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.i686.rpm
File outdated by:  RHSA-2016:0997
    MD5: a9a5f79f4578e962517f7fa42fd11122
SHA-256: 41c2c2b0784d6624441d75dcf9c09922b5350810ba40e04fcf1593c0263c30ec
 
PPC:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.ppc64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 35592f8acc57a8c894feb02175b424a7
SHA-256: 6cd0ec85916b732b9cda5ffe5c2c427c11706a6776074ffb8243e85d0d16fbc1
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.ppc64.rpm
File outdated by:  RHSA-2016:0997
    MD5: c5cfb94b7761bcfd28a8a23cc187ba88
SHA-256: c54d9dbd572ec5743513a746666316cfc95998c20d40739870ca9b4fc20775a4
 
x86_64:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 51063e3f3e7666a3d7dca52cddaec198
SHA-256: 6d8cf78420e0fc3d5ad3336ed8d62714ae187e35e667c485baa7fd316d28cb1e
qemu-img-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: f77576ea6a25a9f5dff621afc19330ee
SHA-256: 58793ee63e99494bbcd38e8f8932cfdb5ece4c1ab7ed5c3d862e962ec01c771a
qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: dd26512584c8229319bd16ece0d0da1a
SHA-256: 07439af3e0c378a8b04c20379bb50cda60993e3e3ee8ea60c26c89f7d0792a80
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 1ab03725aa0fa3f5298c2c7234dce197
SHA-256: d5465fc71e6db12ad28f9bca2ef8e51bef54740a99ecf872e043c2e9ba418f97
qemu-kvm-tools-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 25c673399bd1a8adf505ebee3ecb38fc
SHA-256: 59cb836032a2d9bd042f4e5a2773593fa948c4edd4d45a0ab6a2a530ba4345e0
 
Red Hat Enterprise Linux Server EUS (v. 6.7.z)

SRPMS:
qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm
File outdated by:  RHSA-2016:0997
    MD5: 2da85abdf9f54060403441108175a5f4
SHA-256: fb9daa323ceff2bb637a0e5abcb6a239a754ccacc0906711a196d1776b4269f1
 
IA-32:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.i686.rpm     MD5: 37e2c09193d8f04378e53a10fcd3839c
SHA-256: f1a7f14a195fb0eabf35da050f52ab0ae7454f6ebb3f58eb33ab45a63cb2741d
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.i686.rpm     MD5: a9a5f79f4578e962517f7fa42fd11122
SHA-256: 41c2c2b0784d6624441d75dcf9c09922b5350810ba40e04fcf1593c0263c30ec
 
PPC:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.ppc64.rpm     MD5: 35592f8acc57a8c894feb02175b424a7
SHA-256: 6cd0ec85916b732b9cda5ffe5c2c427c11706a6776074ffb8243e85d0d16fbc1
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.ppc64.rpm     MD5: c5cfb94b7761bcfd28a8a23cc187ba88
SHA-256: c54d9dbd572ec5743513a746666316cfc95998c20d40739870ca9b4fc20775a4
 
x86_64:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.x86_64.rpm     MD5: 51063e3f3e7666a3d7dca52cddaec198
SHA-256: 6d8cf78420e0fc3d5ad3336ed8d62714ae187e35e667c485baa7fd316d28cb1e
qemu-img-0.12.1.2-2.479.el6_7.4.x86_64.rpm     MD5: f77576ea6a25a9f5dff621afc19330ee
SHA-256: 58793ee63e99494bbcd38e8f8932cfdb5ece4c1ab7ed5c3d862e962ec01c771a
qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64.rpm     MD5: dd26512584c8229319bd16ece0d0da1a
SHA-256: 07439af3e0c378a8b04c20379bb50cda60993e3e3ee8ea60c26c89f7d0792a80
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.x86_64.rpm     MD5: 1ab03725aa0fa3f5298c2c7234dce197
SHA-256: d5465fc71e6db12ad28f9bca2ef8e51bef54740a99ecf872e043c2e9ba418f97
qemu-kvm-tools-0.12.1.2-2.479.el6_7.4.x86_64.rpm     MD5: 25c673399bd1a8adf505ebee3ecb38fc
SHA-256: 59cb836032a2d9bd042f4e5a2773593fa948c4edd4d45a0ab6a2a530ba4345e0
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.479.el6_7.4.src.rpm
File outdated by:  RHSA-2016:0997
    MD5: 2da85abdf9f54060403441108175a5f4
SHA-256: fb9daa323ceff2bb637a0e5abcb6a239a754ccacc0906711a196d1776b4269f1
 
IA-32:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.i686.rpm
File outdated by:  RHSA-2016:0997
    MD5: 37e2c09193d8f04378e53a10fcd3839c
SHA-256: f1a7f14a195fb0eabf35da050f52ab0ae7454f6ebb3f58eb33ab45a63cb2741d
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.i686.rpm
File outdated by:  RHSA-2016:0997
    MD5: a9a5f79f4578e962517f7fa42fd11122
SHA-256: 41c2c2b0784d6624441d75dcf9c09922b5350810ba40e04fcf1593c0263c30ec
 
x86_64:
qemu-guest-agent-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 51063e3f3e7666a3d7dca52cddaec198
SHA-256: 6d8cf78420e0fc3d5ad3336ed8d62714ae187e35e667c485baa7fd316d28cb1e
qemu-img-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: f77576ea6a25a9f5dff621afc19330ee
SHA-256: 58793ee63e99494bbcd38e8f8932cfdb5ece4c1ab7ed5c3d862e962ec01c771a
qemu-kvm-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: dd26512584c8229319bd16ece0d0da1a
SHA-256: 07439af3e0c378a8b04c20379bb50cda60993e3e3ee8ea60c26c89f7d0792a80
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 1ab03725aa0fa3f5298c2c7234dce197
SHA-256: d5465fc71e6db12ad28f9bca2ef8e51bef54740a99ecf872e043c2e9ba418f97
qemu-kvm-tools-0.12.1.2-2.479.el6_7.4.x86_64.rpm
File outdated by:  RHSA-2016:0997
    MD5: 25c673399bd1a8adf505ebee3ecb38fc
SHA-256: 59cb836032a2d9bd042f4e5a2773593fa948c4edd4d45a0ab6a2a530ba4345e0
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1296060 - CVE-2016-1714 Qemu: nvram: OOB r/w access in processing firmware configurations


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/