Skip to navigation

Security Advisory Important: qemu-kvm security update

Advisory: RHSA-2013:0609-1
Type: Security Advisory
Severity: Important
Issued on: 2013-03-07
Last updated on: 2013-03-07
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.4)
Red Hat Enterprise Linux Server EUS (v. 6.4.z)
Red Hat Enterprise Linux Workstation (v. 6)
CVEs (cve.mitre.org): CVE-2012-6075

Details

Updated qemu-kvm packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component
for running virtual machines using KVM.

A flaw was found in the way QEMU-KVM emulated the e1000 network interface
card when the host was configured to accept jumbo network frames, and a
guest using the e1000 emulated driver was not. A remote attacker could use
this flaw to crash the guest or, potentially, execute arbitrary code with
root privileges in the guest. (CVE-2012-6075)

All users of qemu-kvm should upgrade to these updated packages, which
contain backported patches to correct this issue. After installing this
update, shut down all running virtual machines. Once all virtual machines
have shut down, start them again for this update to take effect.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.355.el6_4.2.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 1c0e48649a051dbe1eb78fe2591d5eca
SHA-256: 628fa6f4d1a205719e2945eb362cd838adc093ac65febba388786228017d8537
 
IA-32:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.i686.rpm
File outdated by:  RHSA-2014:0420
    MD5: 20c4e9b7e6ee7df75c43c680e819941a
SHA-256: caf79e9e5dc84cb2f2007f783577923680428b815a4e71303588f4f4c9cfd03f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.i686.rpm
File outdated by:  RHSA-2014:0420
    MD5: 0f6fd6e47488b819a2ef44a17d0b66eb
SHA-256: 5cca8e6c890765fd3b6a620dc5ebeb24964b3071149af80e4559b7a1f12faa95
 
x86_64:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: fa13fe6b50325330e73105e17e2ca6cb
SHA-256: a04bb9cb13fd265e0a44421f3012d15060739e6756c550a4bf1323d53208c456
qemu-guest-agent-win32-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4cf2bc00ecda0d58ab92f0cf39816d2d
SHA-256: c0c79fa6972ef8cfea5b243f9d745eef8caf0234a1d3e5ffd6d2011269df212e
qemu-img-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a84d2ce6bc6b33de8c622ba2bff08537
SHA-256: 0d42dcf61ff5ef37a9e455796305d44c83eaebbffb19335834da228c85fad778
qemu-kvm-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 9cb8839fd4a4ca02d06d5aa04efbb1a3
SHA-256: 236a9378137c7a18c1c29255fe74503171809a051b4e5b98d649f170db7ac496
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4f9508b8969af2895cab90358c5be9b5
SHA-256: d0d0d6c4fdaf15d3a4c0e5722a5c702741558e28ab69fbe3c1a13a901a8b64a9
qemu-kvm-tools-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 6b4ea1f3b8bd7ffa0c4ed97d7459482a
SHA-256: 7f9caa3349c23df0157be2254447f5766facc2a11827f69c9f9554f997bbca98
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.355.el6_4.2.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 1c0e48649a051dbe1eb78fe2591d5eca
SHA-256: 628fa6f4d1a205719e2945eb362cd838adc093ac65febba388786228017d8537
 
x86_64:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: fa13fe6b50325330e73105e17e2ca6cb
SHA-256: a04bb9cb13fd265e0a44421f3012d15060739e6756c550a4bf1323d53208c456
qemu-guest-agent-win32-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4cf2bc00ecda0d58ab92f0cf39816d2d
SHA-256: c0c79fa6972ef8cfea5b243f9d745eef8caf0234a1d3e5ffd6d2011269df212e
qemu-img-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a84d2ce6bc6b33de8c622ba2bff08537
SHA-256: 0d42dcf61ff5ef37a9e455796305d44c83eaebbffb19335834da228c85fad778
qemu-kvm-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 9cb8839fd4a4ca02d06d5aa04efbb1a3
SHA-256: 236a9378137c7a18c1c29255fe74503171809a051b4e5b98d649f170db7ac496
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4f9508b8969af2895cab90358c5be9b5
SHA-256: d0d0d6c4fdaf15d3a4c0e5722a5c702741558e28ab69fbe3c1a13a901a8b64a9
qemu-kvm-tools-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 6b4ea1f3b8bd7ffa0c4ed97d7459482a
SHA-256: 7f9caa3349c23df0157be2254447f5766facc2a11827f69c9f9554f997bbca98
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.355.el6_4.2.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 1c0e48649a051dbe1eb78fe2591d5eca
SHA-256: 628fa6f4d1a205719e2945eb362cd838adc093ac65febba388786228017d8537
 
IA-32:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.i686.rpm
File outdated by:  RHSA-2014:0420
    MD5: 20c4e9b7e6ee7df75c43c680e819941a
SHA-256: caf79e9e5dc84cb2f2007f783577923680428b815a4e71303588f4f4c9cfd03f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.i686.rpm
File outdated by:  RHSA-2014:0420
    MD5: 0f6fd6e47488b819a2ef44a17d0b66eb
SHA-256: 5cca8e6c890765fd3b6a620dc5ebeb24964b3071149af80e4559b7a1f12faa95
 
x86_64:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: fa13fe6b50325330e73105e17e2ca6cb
SHA-256: a04bb9cb13fd265e0a44421f3012d15060739e6756c550a4bf1323d53208c456
qemu-guest-agent-win32-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4cf2bc00ecda0d58ab92f0cf39816d2d
SHA-256: c0c79fa6972ef8cfea5b243f9d745eef8caf0234a1d3e5ffd6d2011269df212e
qemu-img-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a84d2ce6bc6b33de8c622ba2bff08537
SHA-256: 0d42dcf61ff5ef37a9e455796305d44c83eaebbffb19335834da228c85fad778
qemu-kvm-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 9cb8839fd4a4ca02d06d5aa04efbb1a3
SHA-256: 236a9378137c7a18c1c29255fe74503171809a051b4e5b98d649f170db7ac496
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4f9508b8969af2895cab90358c5be9b5
SHA-256: d0d0d6c4fdaf15d3a4c0e5722a5c702741558e28ab69fbe3c1a13a901a8b64a9
qemu-kvm-tools-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 6b4ea1f3b8bd7ffa0c4ed97d7459482a
SHA-256: 7f9caa3349c23df0157be2254447f5766facc2a11827f69c9f9554f997bbca98
 
Red Hat Enterprise Linux Server AUS (v. 6.4)

SRPMS:
qemu-kvm-0.12.1.2-2.355.el6_4.2.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 1c0e48649a051dbe1eb78fe2591d5eca
SHA-256: 628fa6f4d1a205719e2945eb362cd838adc093ac65febba388786228017d8537
 
x86_64:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: fa13fe6b50325330e73105e17e2ca6cb
SHA-256: a04bb9cb13fd265e0a44421f3012d15060739e6756c550a4bf1323d53208c456
qemu-guest-agent-win32-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4cf2bc00ecda0d58ab92f0cf39816d2d
SHA-256: c0c79fa6972ef8cfea5b243f9d745eef8caf0234a1d3e5ffd6d2011269df212e
qemu-img-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: a84d2ce6bc6b33de8c622ba2bff08537
SHA-256: 0d42dcf61ff5ef37a9e455796305d44c83eaebbffb19335834da228c85fad778
qemu-kvm-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 9cb8839fd4a4ca02d06d5aa04efbb1a3
SHA-256: 236a9378137c7a18c1c29255fe74503171809a051b4e5b98d649f170db7ac496
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4f9508b8969af2895cab90358c5be9b5
SHA-256: d0d0d6c4fdaf15d3a4c0e5722a5c702741558e28ab69fbe3c1a13a901a8b64a9
qemu-kvm-tools-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 6b4ea1f3b8bd7ffa0c4ed97d7459482a
SHA-256: 7f9caa3349c23df0157be2254447f5766facc2a11827f69c9f9554f997bbca98
 
Red Hat Enterprise Linux Server EUS (v. 6.4.z)

SRPMS:
qemu-kvm-0.12.1.2-2.355.el6_4.2.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 1c0e48649a051dbe1eb78fe2591d5eca
SHA-256: 628fa6f4d1a205719e2945eb362cd838adc093ac65febba388786228017d8537
 
IA-32:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.i686.rpm
File outdated by:  RHBA-2013:1401
    MD5: 20c4e9b7e6ee7df75c43c680e819941a
SHA-256: caf79e9e5dc84cb2f2007f783577923680428b815a4e71303588f4f4c9cfd03f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.i686.rpm
File outdated by:  RHBA-2013:1401
    MD5: 0f6fd6e47488b819a2ef44a17d0b66eb
SHA-256: 5cca8e6c890765fd3b6a620dc5ebeb24964b3071149af80e4559b7a1f12faa95
 
x86_64:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: fa13fe6b50325330e73105e17e2ca6cb
SHA-256: a04bb9cb13fd265e0a44421f3012d15060739e6756c550a4bf1323d53208c456
qemu-guest-agent-win32-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4cf2bc00ecda0d58ab92f0cf39816d2d
SHA-256: c0c79fa6972ef8cfea5b243f9d745eef8caf0234a1d3e5ffd6d2011269df212e
qemu-img-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: a84d2ce6bc6b33de8c622ba2bff08537
SHA-256: 0d42dcf61ff5ef37a9e455796305d44c83eaebbffb19335834da228c85fad778
qemu-kvm-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 9cb8839fd4a4ca02d06d5aa04efbb1a3
SHA-256: 236a9378137c7a18c1c29255fe74503171809a051b4e5b98d649f170db7ac496
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4f9508b8969af2895cab90358c5be9b5
SHA-256: d0d0d6c4fdaf15d3a4c0e5722a5c702741558e28ab69fbe3c1a13a901a8b64a9
qemu-kvm-tools-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 6b4ea1f3b8bd7ffa0c4ed97d7459482a
SHA-256: 7f9caa3349c23df0157be2254447f5766facc2a11827f69c9f9554f997bbca98
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
qemu-kvm-0.12.1.2-2.355.el6_4.2.src.rpm
File outdated by:  RHSA-2014:0420
    MD5: 1c0e48649a051dbe1eb78fe2591d5eca
SHA-256: 628fa6f4d1a205719e2945eb362cd838adc093ac65febba388786228017d8537
 
IA-32:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.i686.rpm
File outdated by:  RHSA-2014:0420
    MD5: 20c4e9b7e6ee7df75c43c680e819941a
SHA-256: caf79e9e5dc84cb2f2007f783577923680428b815a4e71303588f4f4c9cfd03f
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.i686.rpm
File outdated by:  RHSA-2014:0420
    MD5: 0f6fd6e47488b819a2ef44a17d0b66eb
SHA-256: 5cca8e6c890765fd3b6a620dc5ebeb24964b3071149af80e4559b7a1f12faa95
 
x86_64:
qemu-guest-agent-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: fa13fe6b50325330e73105e17e2ca6cb
SHA-256: a04bb9cb13fd265e0a44421f3012d15060739e6756c550a4bf1323d53208c456
qemu-guest-agent-win32-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4cf2bc00ecda0d58ab92f0cf39816d2d
SHA-256: c0c79fa6972ef8cfea5b243f9d745eef8caf0234a1d3e5ffd6d2011269df212e
qemu-img-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: a84d2ce6bc6b33de8c622ba2bff08537
SHA-256: 0d42dcf61ff5ef37a9e455796305d44c83eaebbffb19335834da228c85fad778
qemu-kvm-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 9cb8839fd4a4ca02d06d5aa04efbb1a3
SHA-256: 236a9378137c7a18c1c29255fe74503171809a051b4e5b98d649f170db7ac496
qemu-kvm-debuginfo-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHBA-2013:1401
    MD5: 4f9508b8969af2895cab90358c5be9b5
SHA-256: d0d0d6c4fdaf15d3a4c0e5722a5c702741558e28ab69fbe3c1a13a901a8b64a9
qemu-kvm-tools-0.12.1.2-2.355.el6_4.2.x86_64.rpm
File outdated by:  RHSA-2014:0420
    MD5: 6b4ea1f3b8bd7ffa0c4ed97d7459482a
SHA-256: 7f9caa3349c23df0157be2254447f5766facc2a11827f69c9f9554f997bbca98
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

889301 - CVE-2012-6075 qemu: e1000 driver buffer overflow when processing large packets when SBP and LPE flags are disabled


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/