8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.079 Low
EPSS
Percentile
93.3%
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the
user-space component for running virtual machines using KVM.
Two integer overflow flaws were found in the QEMU block driver for QCOW
version 1 disk images. A user able to supply a malicious image file to QEMU
or to helper tools used in image conversion by services such as glance and
nova could potentially use these flaws to cause memory corruption,
resulting in a crash or possibly arbitrary code execution. (CVE-2014-0222,
CVE-2014-0223)
Multiple buffer overflow, input validation, and out-of-bounds write flaws
were found in the way virtio, virtio-net, virtio-scsi, usb, and hpet
drivers of QEMU handled state loading after migration. A user able to alter
the savevm data (either on the disk or over the wire during migration)
could use either of these flaws to corrupt QEMU process memory on the
(destination) host, which could potentially result in arbitrary code
execution on the host with the privileges of the QEMU process.
(CVE-2013-4148, CVE-2013-4149, CVE-2013-4150, CVE-2013-4151, CVE-2013-4527,
CVE-2013-4529, CVE-2013-4535, CVE-2013-4536, CVE-2013-4541, CVE-2013-4542,
CVE-2013-6399, CVE-2014-0182, CVE-2014-3461)
Red Hat would like to thank NSA for reporting CVE-2014-0222 and
CVE-2014-0223. The following issues were discovered by Michael S. Tsirkin,
Anthony Liguori, and Michael Roth of Red Hat: CVE-2013-4148, CVE-2013-4149,
CVE-2013-4150, CVE-2013-4151, CVE-2013-4527, CVE-2013-4529, CVE-2013-4535,
CVE-2013-4536, CVE-2013-4541, CVE-2013-4542, CVE-2013-6399, CVE-2014-0182,
and CVE-2014-3461.
All qemu-kvm-rhev users are advised to upgrade to these updated packages,
which contain backported patches to correct these issues. After installing
this update, shut down all running virtual machines. Once all virtual
machines have shut down, start them again for this update to take effect.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | 7 | x86_64 | qemu-img-rhev | < 1.5.3-60.el7_0.7 | qemu-img-rhev-1.5.3-60.el7_0.7.x86_64.rpm |
RedHat | 7 | x86_64 | qemu-kvm-rhev-debuginfo | < 1.5.3-60.el7_0.7 | qemu-kvm-rhev-debuginfo-1.5.3-60.el7_0.7.x86_64.rpm |
RedHat | 7 | x86_64 | libcacard-devel-rhev | < 1.5.3-60.el7_0.7 | libcacard-devel-rhev-1.5.3-60.el7_0.7.x86_64.rpm |
RedHat | 7 | x86_64 | libcacard-tools-rhev | < 1.5.3-60.el7_0.7 | libcacard-tools-rhev-1.5.3-60.el7_0.7.x86_64.rpm |
RedHat | 7 | src | qemu-kvm-rhev | < 1.5.3-60.el7_0.7 | qemu-kvm-rhev-1.5.3-60.el7_0.7.src.rpm |
RedHat | 7 | x86_64 | qemu-kvm-common-rhev | < 1.5.3-60.el7_0.7 | qemu-kvm-common-rhev-1.5.3-60.el7_0.7.x86_64.rpm |
RedHat | 7 | x86_64 | qemu-kvm-rhev | < 1.5.3-60.el7_0.7 | qemu-kvm-rhev-1.5.3-60.el7_0.7.x86_64.rpm |
RedHat | 7 | x86_64 | libcacard-rhev | < 1.5.3-60.el7_0.7 | libcacard-rhev-1.5.3-60.el7_0.7.x86_64.rpm |
RedHat | 7 | x86_64 | qemu-kvm-tools-rhev | < 1.5.3-60.el7_0.7 | qemu-kvm-tools-rhev-1.5.3-60.el7_0.7.x86_64.rpm |
8.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.079 Low
EPSS
Percentile
93.3%