8.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.004 Low
EPSS
Percentile
74.1%
CentOS Errata and Security Advisory CESA-2016:0083
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the
user-space component for running virtual machines using KVM.
An out-of-bounds read/write flaw was discovered in the way QEMU’s Firmware
Configuration device emulation processed certain firmware configurations.
A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the
QEMU process instance or, potentially, execute arbitrary code on the host
with privileges of the QEMU process. (CVE-2016-1714)
Red Hat would like to thank Donghai Zhu of Alibaba for reporting this
issue.
This update also fixes the following bugs:
All qemu-kvm users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. After installing this
update, shut down all running virtual machines. Once all virtual machines
have shut down, start them again for this update to take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2016-February/083799.html
Affected packages:
libcacard
libcacard-devel
libcacard-tools
qemu-img
qemu-kvm
qemu-kvm-common
qemu-kvm-tools
Upstream details at:
https://access.redhat.com/errata/RHSA-2016:0083
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 7 | i686 | libcacard | < 1.5.3-105.el7_2.3 | libcacard-1.5.3-105.el7_2.3.i686.rpm |
CentOS | 7 | x86_64 | libcacard | < 1.5.3-105.el7_2.3 | libcacard-1.5.3-105.el7_2.3.x86_64.rpm |
CentOS | 7 | i686 | libcacard-devel | < 1.5.3-105.el7_2.3 | libcacard-devel-1.5.3-105.el7_2.3.i686.rpm |
CentOS | 7 | x86_64 | libcacard-devel | < 1.5.3-105.el7_2.3 | libcacard-devel-1.5.3-105.el7_2.3.x86_64.rpm |
CentOS | 7 | x86_64 | libcacard-tools | < 1.5.3-105.el7_2.3 | libcacard-tools-1.5.3-105.el7_2.3.x86_64.rpm |
CentOS | 7 | x86_64 | qemu-img | < 1.5.3-105.el7_2.3 | qemu-img-1.5.3-105.el7_2.3.x86_64.rpm |
CentOS | 7 | x86_64 | qemu-kvm | < 1.5.3-105.el7_2.3 | qemu-kvm-1.5.3-105.el7_2.3.x86_64.rpm |
CentOS | 7 | x86_64 | qemu-kvm-common | < 1.5.3-105.el7_2.3 | qemu-kvm-common-1.5.3-105.el7_2.3.x86_64.rpm |
CentOS | 7 | x86_64 | qemu-kvm-tools | < 1.5.3-105.el7_2.3 | qemu-kvm-tools-1.5.3-105.el7_2.3.x86_64.rpm |
8.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.004 Low
EPSS
Percentile
74.1%