First published: Tue May 25 2010(Updated: )
The rhev-hypervisor package provides a Red Hat Enterprise Virtualization<br>(RHEV) Hypervisor ISO disk image. The RHEV Hypervisor is a dedicated<br>Kernel-based Virtual Machine (KVM) hypervisor. It includes everything<br>necessary to run and manage virtual machines: A subset of the Red Hat<br>Enterprise Linux operating environment and the Red Hat Enterprise<br>Virtualization Agent.<br>Note: RHEV Hypervisor is only available for the Intel 64 and AMD64<br>architectures with virtualization extensions.<br>It was discovered that OpenSSL did not always check the return value of<br>the bn_wexpand() function. An attacker able to trigger a memory allocation<br>failure in that function could cause an application using the OpenSSL<br>library to crash or, possibly, execute arbitrary code. (CVE-2009-3245)<br>A flaw was found in the way the TLS/SSL (Transport Layer Security/Secure<br>Sockets Layer) protocols handled session renegotiation. A man-in-the-middle<br>attacker could use this flaw to prefix arbitrary plain text to a client's<br>session (for example, an HTTPS connection to a website). This could force<br>the server to process an attacker's request as if authenticated using the<br>victim's credentials. This update addresses this flaw in openssl, nss, and<br>gnutls by implementing the TLS Renegotiation Indication Extension, as<br>defined in RFC 5746. (CVE-2009-3555)<br>This updated package provides updated components that include fixes for<br>security issues; however, these issues have no security impact for RHEV<br>Hypervisor. These fixes are for kernel issues CVE-2009-4307, CVE-2010-0727,<br>CVE-2009-4027, and CVE-2010-1188; cpio issues CVE-2010-0624 and<br>CVE-2007-4476; gnutls issue CVE-2009-2409; openssl issue CVE-2010-0433; and<br>tar issues CVE-2010-0624 and CVE-2007-4476.<br>This update also fixes the following bugs:<br><li> bridged network interfaces using the bnx2x, mlx4_en, enic and s2io</li> drivers had Large Receive Offload (LRO) enabled by default. This caused<br>significantly degraded network I/O performance. LRO has been disabled for<br>all network interface drivers which have LRO enabled by default in Red Hat<br>Enterprise Linux 5. With this change, network I/O performance is<br>significantly improved. (BZ#576374, BZ#579730)<br><li> RHEV Hypervisor supported IPv6, but as this is not used to communicate</li> with the RHEV Manager, it is superfluous. Support for IPv6 has now been<br>disabled in RHEV Hypervisor. (BZ#577300)<br><li> for VLAN interfaces, the hardware (MAC) address of the interface was set</li> only in the VLAN ifcfg script, not in the physical interface ifcfg script.<br>This caused network interfaces with VLAN tags to intermittently fail on<br>boot. The MAC address is now set in the ifcfg script for the underlying<br>physical interface. Network interfaces with VLAN tags now work consistently<br>between reboots. (BZ#581876)<br><li> the hypervisor would hang on reboot after repeated upgrade operations,</li> due to GRUB accessing the /boot file system before it was flushed. The<br>/boot file system is now remounted before GRUB accesses it. (BZ#591111)<br>As RHEV Hypervisor is based on KVM, the bug fixes from the KVM update<br>RHBA-2010:0434 have been included in this update. Also included are the bug<br>fixes from the RHEV Manager Agent (VDSM) update RHBA-2010:0435.<br>KVM: <a href="https://rhn.redhat.com/errata/RHBA-2010-0434.html" target="_blank">https://rhn.redhat.com/errata/RHBA-2010-0434.html</a> VDSM: <a href="https://rhn.redhat.com/errata/RHBA-2010-0435.html" target="_blank">https://rhn.redhat.com/errata/RHBA-2010-0435.html</a> Users of the Red Hat Enterprise Virtualization Hypervisor are advised to<br>upgrade to this updated package, which corrects these issues.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat RHEV Hypervisor | ||
OpenSSL libcrypto | ||
Debian GnuTLS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2010:0440 is classified as important.
To fix RHSA-2010:0440, you should update the rhev-hypervisor package to the latest version provided by Red Hat.
Not addressing RHSA-2010:0440 may lead to vulnerabilities that can be exploited, potentially compromising the security of virtual machines.
RHSA-2010:0440 affects systems using the rhev-hypervisor package in Red Hat Enterprise Virtualization environments.
RHSA-2010:0440 was released on March 9, 2010.