Lucene search

K
centosCentOS ProjectCESA-2011:1801
HistoryDec 22, 2011 - 3:53 p.m.

qemu security update

2011-12-2215:53:51
CentOS Project
lists.centos.org
40

6.8 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:H/Au:N/C:C/I:C/A:C

0.051 Low

EPSS

Percentile

93.0%

CentOS Errata and Security Advisory CESA-2011:1801

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component
for running virtual machines using KVM.

A flaw was found in the way qemu-kvm handled VSC_ATR messages when a guest
was configured for a CCID (Chip/Smart Card Interface Devices) USB smart
card reader in passthrough mode. An attacker able to connect to the port on
the host being used for such a device could use this flaw to crash the
qemu-kvm process on the host or, possibly, escalate their privileges on the
host. (CVE-2011-4111)

All users of qemu-kvm should upgrade to these updated packages, which
contain a backported patch to resolve this issue. After installing this
update, shut down all running virtual machines. Once all virtual machines
have shut down, start them again for this update to take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2011-December/080511.html

Affected packages:
qemu-img
qemu-kvm
qemu-kvm-tools

Upstream details at:
https://access.redhat.com/errata/RHSA-2011:1801

6.8 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:A/AC:H/Au:N/C:C/I:C/A:C

0.051 Low

EPSS

Percentile

93.0%