Advisory Published

RHSA-2010:0476: Important: rhev-hypervisor security, bug fix, and enhancement update

First published: Tue Jun 22 2010(Updated: )

The rhev-hypervisor package provides a Red Hat Enterprise Virtualization<br>Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor<br>is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes<br>everything necessary to run and manage virtual machines: A subset of the<br>Red Hat Enterprise Linux operating environment and the Red Hat Enterprise<br>Virtualization Agent.<br>Note: Red Hat Enterprise Virtualization Hypervisor is only available for<br>the Intel 64 and AMD64 architectures with virtualization extensions.<br>A flaw was found in the way QEMU-KVM handled erroneous data provided by the<br>Linux virtio-net driver, used by guest operating systems. Due to a<br>deficiency in the TSO (TCP segment offloading) implementation, a guest's<br>virtio-net driver would transmit improper data to a certain QEMU-KVM<br>process on the host, causing the guest to crash. A remote attacker could<br>use this flaw to send specially-crafted data to a target guest system,<br>causing that guest to crash. (CVE-2010-0741)<br>A flaw was found in the way the Virtual Desktop Server Manager (VDSM)<br>handled the removal of a virtual machine's (VM) data back end (such as an<br>image or a volume). When removing an image or a volume, it was not securely<br>deleted from its corresponding data domain as expected. A guest user in a<br>new, raw VM, created in a data domain that has had VMs deleted from it,<br>could use this flaw to read limited data from those deleted VMs,<br>potentially disclosing sensitive information. (CVE-2010-2223)<br>This updated package provides updated components that include fixes for<br>security issues; however, these issues have no security impact for Red Hat<br>Enterprise Virtualization Hypervisor. These fixes are for dbus issue<br>CVE-2009-1189; kernel issues CVE-2010-0307, CVE-2010-0410, CVE-2010-0730,<br>CVE-2010-1085, and CVE-2010-1086; openldap issue CVE-2009-3767; and sudo<br>issues CVE-2010-0426, CVE-2010-0427, and CVE-2010-1163.<br>This update also fixes several bugs and adds several enhancements.<br>Documentation for these bug fixes and enhancements is available from<br><a href="http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/2.2/html/Servers-5.5-2.2_Hypervisor_Security_Update" target="_blank">http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Virtualization/2.2/html/Servers-5.5-2.2_Hypervisor_Security_Update</a> As Red Hat Enterprise Virtualization Hypervisor is based on KVM, the bug<br>fixes and enhancements from the KVM updates RHSA-2010:0271 and<br>RHBA-2010:0419 have been included in this update. Also included are the bug<br>fixes and enhancements from the Virtual Desktop Server Manager (VDSM)<br>update RHSA-2010:0473, and fence-agents update RHBA-2010:0477.<br>KVM: <a href="https://rhn.redhat.com/errata/RHSA-2010-0271.html" target="_blank">https://rhn.redhat.com/errata/RHSA-2010-0271.html</a> and<br><a href="https://rhn.redhat.com/errata/RHBA-2010-0419.html" target="_blank">https://rhn.redhat.com/errata/RHBA-2010-0419.html</a> VDSM: <a href="https://rhn.redhat.com/errata/RHSA-2010-0473.html" target="_blank">https://rhn.redhat.com/errata/RHSA-2010-0473.html</a> fence-agents: <a href="https://rhn.redhat.com/errata/RHBA-2010-0477.html" target="_blank">https://rhn.redhat.com/errata/RHBA-2010-0477.html</a> Users of the Red Hat Enterprise Virtualization Hypervisor are advised to<br>upgrade to this updated package, which corrects these issues and adds these<br>enhancements.<br>

Affected SoftwareAffected VersionHow to fix

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203