copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2011.1277.2 - UPDATE [RedHat] rhev-hypervisor6: Multiple vulnerabilities

Date: 23 December 2011
References: ESB-2011.1203  ESB-2011.1248  ESB-2011.1254  ESB-2011.1279  ESB-2012.0078  ESB-2012.0221  ESB-2012.0249  ESB-2013.0037  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2011.1277.2
          Important: rhev-hypervisor6 security and bug fix update
                             23 December 2011

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rhev-hypervisor6
Publisher:         Red Hat
Operating System:  Red Hat Enterprise Linux Server 6
                   Red Hat Enterprise Linux WS/Desktop 6
Impact/Access:     Increased Privileges     -- Existing Account
                   Modify Arbitrary Files   -- Existing Account
                   Access Confidential Data -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2011-4539 CVE-2011-4339 CVE-2011-4127
                   CVE-2011-1530  

Reference:         ESB-2011.1254
                   ESB-2011.1248
                   ESB-2011.1203

Original Bulletin: 
   https://rhn.redhat.com/errata/RHSA-2011-1850.html

Revision History:  December 23 2011: Corrected impact/access
                   December 23 2011: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: rhev-hypervisor6 security and bug fix update
Advisory ID:       RHSA-2011:1850-01
Product:           Red Hat Enterprise Virtualization
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2011-1850.html
Issue date:        2011-12-22
CVE Names:         CVE-2011-4127 
=====================================================================

1. Summary:

An updated rhev-hypervisor6 package that fixes one security issue and two
bugs is now available.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

2. Relevant releases/architectures:

RHEV Hypervisor for RHEL-6 - noarch

3. Description:

The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: A subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.

Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.

Using the SG_IO IOCTL to issue SCSI requests to partitions or LVM volumes
resulted in the requests being passed to the underlying block device. If a
privileged user only had access to a single partition or LVM volume, they
could use this flaw to bypass those restrictions and gain read and write
access (and be able to issue other SCSI commands) to the entire block
device.

In KVM (Kernel-based Virtual Machine) environments using raw format virtio
disks backed by a partition or LVM volume, a privileged guest user could
bypass intended restrictions and issue read and write requests (and other
SCSI commands) on the host, and possibly access the data of other guests
that reside on the same underlying block device. Refer to Red Hat Bugzilla
bug 752375 for further details and a mitigation script for users who cannot
apply this update immediately. (CVE-2011-4127)

This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:

CVE-2011-4539 (dhcp issue)

CVE-2011-4339 (ipmitool issue)

CVE-2011-1530 (krb5 issue)

This update also fixes the following bugs:

* Virtual LAN (VLAN) identifiers containing a space were accepted, even
though they could not be configured correctly. With this update, VLAN
identifiers containing a space are rejected with an "Invalid VLAN ID"
message. (BZ#761537)

* After configuring netconsole, it was not possible to start the service:
the "service netconsole start" command failed with a warning that
configfs.ko could not be found, and a fatal error that netconsole.ko could
not be inserted. With this update, the netconsole service starts as
expected. Note that after netconsole is configured, the service will not
automatically start, even after rebooting. The service must be manually
started. (BZ#765898)

Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which corrects these issues.

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

752375 - CVE-2011-4127 kernel: possible privilege escalation via SG_IO ioctl
760333 - rhev-hypervisor6 6.2 update 1 release bugzilla
761537 - vlan id should not accept a space in it
765898 - netconsole does not work

6. Package List:

RHEV Hypervisor for RHEL-6:

Source:
ftp://ftp.redhat.com/pub/redhat/linux/enterprise/6Server/en/RHEV/SRPMS/rhev-hypervisor6-6.2-20111215.0.el6_2.src.rpm

noarch:
rhev-hypervisor6-6.2-20111215.0.el6_2.noarch.rpm
rhev-hypervisor6-tools-6.2-20111215.0.el6_2.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/#package

7. References:

https://www.redhat.com/security/data/cve/CVE-2011-4127.html
https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=752375

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2011 Red Hat, Inc.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFO83hXXlSAg2UNWIIRAlAbAKCAqLLduGjg61ffMxf8X2epa/3f3gCeK0tj
74L8in3ucoO3CUWlcYWcx1w=
=P2vI
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=2LCL
-----END PGP SIGNATURE-----