Skip to navigation

Security Advisory Important: rhev-hypervisor6 security and bug fix update

Advisory: RHSA-2012:0531-1
Type: Security Advisory
Severity: Important
Issued on: 2012-04-30
Last updated on: 2012-04-30
Affected Products: Red Hat Enterprise Virtualization 3
CVEs (cve.mitre.org): CVE-2012-0864
CVE-2012-1569
CVE-2012-1573

Details

An updated rhev-hypervisor6 package that fixes three security issues and
one bug is now available.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: A subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.

Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.

A flaw was found in the way libtasn1 decoded DER data. An attacker could
create carefully-crafted DER encoded input (such as an X.509 certificate)
that, when parsed by an application that uses libtasn1 (such as
applications using GnuTLS), could cause the application to crash.
(CVE-2012-1569)

A flaw was found in the way GnuTLS decrypted malformed TLS records. This
could cause a TLS/SSL client or server to crash when processing a
specially-crafted TLS record from a remote TLS/SSL connection peer.
(CVE-2012-1573)

An integer overflow flaw was found in the implementation of the printf
functions family. This could allow an attacker to bypass FORTIFY_SOURCE
protections and execute arbitrary code using a format string flaw in an
application, even though these protections are expected to limit the
impact of such flaws to an application abort. (CVE-2012-0864)

Red Hat would like to thank Matthew Hall of Mu Dynamics for reporting
CVE-2012-1569 and CVE-2012-1573.

This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:

CVE-2011-4128 (gnutls issue)

CVE-2012-0879, CVE-2012-1090, and CVE-2012-1097 (kernel issues)

CVE-2012-0884 and CVE-2012-1165 (openssl issues)

CVE-2012-0060, CVE-2012-0061, and CVE-2012-0815 (rpm issues)

This update also fixes the following bug:

* The Hypervisor previously set the lro_disable option for the enic driver.
The driver does not support this option, as a result the Hypervisor did
not correctly detect and configure the network interfaces of a Cisco M81KR
adaptor, when present. The Hypervisor has been updated and no longer sets
the invalid option for this driver. (BZ#809463)

Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Virtualization 3

x86_64:
rhev-hypervisor6-6.2-20120423.1.el6_2.noarch.rpm
File outdated by:  RHSA-2014:0378
    MD5: 153738d9f486ec460b681aa9b35e3207
SHA-256: 94903a19de790548fd36403f79dbd883a5d4d7ec38b62249c1d7cb57a48f824b
rhev-hypervisor6-tools-6.2-20120423.1.el6_2.noarch.rpm
File outdated by:  RHSA-2012:1375
    MD5: e1a01cbd4d70f5a6201140c3a2544889
SHA-256: 3f5d58e03c8c64537111f9ee2aa0581792b78ba8387484a99cdea2f58000396a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

794766 - CVE-2012-0864 glibc: FORTIFY_SOURCE format string protection bypass via "nargs" integer overflow
804920 - CVE-2012-1569 libtasn1: DER decoding buffer overflow (GNUTLS-SA-2012-3, MU-201202-02)
805432 - CVE-2012-1573 gnutls: TLS record handling issue (GNUTLS-SA-2012-2, MU-201202-01)


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/