RHSA-2012:0168 - Security Advisory
Important: rhev-hypervisor5 security and bug fix update
Security Advisory: Important
An updated rhev-hypervisor5 package that fixes several security issues and
various bugs is now available.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
The rhev-hypervisor5 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization
Hypervisor is a dedicated Kernel-based Virtual Machine (KVM) hypervisor.
It includes everything necessary to run and manage virtual machines: A
subset of the Red Hat Enterprise Linux operating environment and the Red
Hat Enterprise Virtualization Agent.
Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.
A heap overflow flaw was found in the way QEMU-KVM emulated the e1000
network interface card. A privileged guest user in a virtual machine whose
network interface is configured to use the e1000 emulated driver could use
this flaw to crash the host or, possibly, escalate their privileges on the
A divide-by-zero flaw was found in the Linux kernel's igmp_heard_query()
function. An attacker able to send certain IGMP (Internet Group Management
Protocol) packets to a target system could use this flaw to cause a denial
of service. (CVE-2012-0207)
A double free flaw was discovered in the policy checking code in OpenSSL.
A remote attacker could use this flaw to crash an application that uses
OpenSSL by providing an X.509 certificate that has specially-crafted
policy extension data. (CVE-2011-4109)
An information leak flaw was found in the SSL 3.0 protocol implementation
in OpenSSL. Incorrect initialization of SSL record padding bytes could
cause an SSL client or server to send a limited amount of possibly
sensitive data to its SSL peer via the encrypted connection.
It was discovered that OpenSSL did not limit the number of TLS/SSL
handshake restarts required to support Server Gated Cryptography. A remote
attacker could use this flaw to make a TLS/SSL server using OpenSSL consume
an excessive amount of CPU by continuously restarting the handshake.
Red Hat would like to thank Nicolae Mogoreanu for reporting CVE-2012-0029,
and Simon McVittie for reporting CVE-2012-0207.
This updated package provides updated components that include fixes for
various security issues. These issues have no security impact on Red Hat
Enterprise Virtualization Hypervisor itself, however. The security fixes
included in this update address the following CVE numbers:
CVE-2006-1168 and CVE-2011-2716 (busybox issues)
CVE-2009-5029, CVE-2009-5064, CVE-2010-0830 and CVE-2011-1089 (glibc
CVE-2011-1083, CVE-2011-3638, CVE-2011-4086, CVE-2011-4127 and
CVE-2012-0028 (kernel issues)
CVE-2011-1526 (krb5 issue)
CVE-2011-4347 (kvm issue)
CVE-2010-4008, CVE-2011-0216, CVE-2011-2834, CVE-2011-3905, CVE-2011-3919
and CVE-2011-1944 (libxml2 issues)
CVE-2011-1749 (nfs-utils issue)
CVE-2011-4108 (openssl issue)
CVE-2011-0010 (sudo issue)
CVE-2011-1675 and CVE-2011-1677 (util-linux issues)
CVE-2010-0424 (vixie-cron issue)
This updated rhev-hypervisor5 package fixes various bugs. Documentation of
these changes will be available shortly in the Technical Notes document:
Users of Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package, which fixes these issues.
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
- Red Hat Virtualization 5 x86_64
- BZ - 606191 - after upgrade , reboot can't shut off network successfully and back to firstboot menu again
- BZ - 627538 - System will not boot sometimes when using rhevm to do upgrade twice.
- BZ - 650179 - rhevm bridge came up instead of breth0 after fail to configure network
- BZ - 675325 - Changes to networking always clear the contents of resolv.conf
- BZ - 696875 - RHEVH bootup hanging in ovirt-early when doing LVM scanning
- BZ - 717535 - [RFE] No confirm message for ntp server setting
- BZ - 728895 - RHEV-H rpm should include a versions text file
- BZ - 732948 - CCISS: Auto install fail at creating physical volume.
- BZ - 734110 - rhevh - upgrade ovirt node fails due to nonexistent breth0
- BZ - 734480 - [RFE] Add virt-who package to RHEVH
- BZ - 734710 - Register RHN satellite will fail if RHN satellite password include space.
- BZ - 740127 - Provide our CPE name in a new system file
- BZ - 743938 - Make rhev-hypervisor RPM multi-installable like the kernel
- BZ - 747519 - RHEV-H 5.8 register to RHN will fail.
- BZ - 747647 - Change rhev-hypervisor RPM to be rhev-hypervisor5 to allow coinstallations with rhev-hypervisor6
- BZ - 756178 - remove redundant brcm-iscsi.log rotation from ovirt-node now that it is in iscsi-initiator-utils
- BZ - 758465 - RHEV-H 5.8 register to RHN will fail if password contains quotes or spaces
- BZ - 759462 - Can not retrieve running guests UUID in RHEVH node.
- BZ - 759632 - virt-who debugging output going to stderr always
- BZ - 759635 - Revert workaround of virt-who output
- BZ - 761357 - Multipathd service is stopped by default cause change password failed in single mode.
- BZ - 768256 - network layout is incorrect when configure network with nic up
- BZ - 771771 - CVE-2011-4109 openssl: double-free in policy checks
- BZ - 771775 - CVE-2011-4576 openssl: uninitialized SSL 3.0 padding
- BZ - 771780 - CVE-2011-4619 openssl: SGC restart DoS attack
- BZ - 772075 - CVE-2012-0029 qemu-kvm: e1000: process_tx_desc legacy mode packets heap overflow
- BZ - 772867 - CVE-2012-0207 kernel: igmp: Avoid zero delay when receiving odd mixture of IGMP queries
- BZ - 783625 - The setup command should only allow password setting and viewing logs in single mode.
The Red Hat security contact is email@example.com. More contact details at https://access.redhat.com/security/team/contact/.