Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Application Foundations
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2017:1431 - Security Advisory
Issued:
2017-06-13
Updated:
2017-06-13

RHSA-2017:1431 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: qemu-kvm-rhev security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for qemu-kvm-rhev is now available for RHEV 3.X Hypervisor and Agents for RHEL-7 and RHEV 4.X RHEV-H and Agents for RHEL-7.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products.

Security Fix(es):

  • An out-of-bounds access issue was found in QEMU's Cirrus CLGD 54xx VGA Emulator support. The vulnerability could occur while copying VGA data using bitblt functions (for example, cirrus_bitblt_rop_fwd_transp_). A privileged user inside a guest could use this flaw to crash the QEMU process, resulting in denial of service. (CVE-2017-7718)

Red Hat would like to thank Jiangxin (PSIRT Huawei Inc.) for reporting
CVE-2017-7718.

Bug Fix(es):

  • When using post-copy migration with the virtio Random Number Generator (RNG) device, virtio-rng continued generating data while the migration was already in post-copy mode. Consequently, the migration sometimes failed and the error message "Failed to load virtio-rng:virtio" was displayed. The source code has been improved and the problem no longer occurs in the scenario described. (BZ#1450375)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

Affected Products

  • Red Hat Virtualization 4 for RHEL 7 x86_64
  • Red Hat Virtualization 3 for RHEL 7 x86_64
  • Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
  • Red Hat Virtualization for IBM Power LE 3 ppc64le

Fixes

  • BZ - 1443441 - CVE-2017-7718 Qemu: display: cirrus: OOB read access issue
  • BZ - 1450375 - Migration failed with postcopy enabled from rhel7.3.z host to rhel7.4 host "error while loading state for instance 0x0 of device 'pci@800000020000000:05.0/virtio-rng'"

CVEs

  • CVE-2017-7718

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Virtualization 4 for RHEL 7

SRPM
qemu-kvm-rhev-2.6.0-28.el7_3.10.src.rpm SHA-256: 86732c70bb900fae4bd00743a968a0b09c534dd36c4ddd506bfab76e701c10ef
x86_64
qemu-img-rhev-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: 43faf00c4ff67d0005521433316d2a2c350abfd80f0c03c84fcbb6ffa001e588
qemu-kvm-common-rhev-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: b4e4bbe8b3fa180ccfbfa63e171abd258af769f0dd68cd4e244856c2a3b915df
qemu-kvm-rhev-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: 12eb1b39080ac6d55d76d037bea03ef68b2a932f054ae61af7f8dd2f0a123e14
qemu-kvm-rhev-debuginfo-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: 8b95f64391e64695a2f64bf25f6ba839645f1e01330bfb85cde19405c41df96e
qemu-kvm-tools-rhev-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: e674c9d04c5cabac4438b75852789734197cc2bdc18605615026e18f0642a4c7

Red Hat Virtualization 3 for RHEL 7

SRPM
qemu-kvm-rhev-2.6.0-28.el7_3.10.src.rpm SHA-256: 86732c70bb900fae4bd00743a968a0b09c534dd36c4ddd506bfab76e701c10ef
x86_64
qemu-img-rhev-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: 43faf00c4ff67d0005521433316d2a2c350abfd80f0c03c84fcbb6ffa001e588
qemu-kvm-common-rhev-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: b4e4bbe8b3fa180ccfbfa63e171abd258af769f0dd68cd4e244856c2a3b915df
qemu-kvm-rhev-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: 12eb1b39080ac6d55d76d037bea03ef68b2a932f054ae61af7f8dd2f0a123e14
qemu-kvm-rhev-debuginfo-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: 8b95f64391e64695a2f64bf25f6ba839645f1e01330bfb85cde19405c41df96e
qemu-kvm-tools-rhev-2.6.0-28.el7_3.10.x86_64.rpm SHA-256: e674c9d04c5cabac4438b75852789734197cc2bdc18605615026e18f0642a4c7

Red Hat Virtualization for IBM Power LE 4 for RHEL 7

SRPM
qemu-kvm-rhev-2.6.0-28.el7_3.10.src.rpm SHA-256: 86732c70bb900fae4bd00743a968a0b09c534dd36c4ddd506bfab76e701c10ef
ppc64le
qemu-img-rhev-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: df03ab0925de8a6f1612079f49c091a7f23b5de9b322018e8415c9b8802a1293
qemu-kvm-common-rhev-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: 5d760219869d1e9a7d741f3f58458b00d9bb2e378089ed7c79a9abd660afced2
qemu-kvm-rhev-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: 829e774ff216698470e4db6c9025ec8cb276b892b7cc653b2720feb99ca4caf9
qemu-kvm-rhev-debuginfo-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: c7b2021680501db6b7d4e77cafc3f59870921699e3dcbe18d8d107b317a9e392
qemu-kvm-tools-rhev-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: 051f5358e3b65332de792da6af255e3c12352238c8b6f79909202cc8f34a3ace

Red Hat Virtualization for IBM Power LE 3

SRPM
qemu-kvm-rhev-2.6.0-28.el7_3.10.src.rpm SHA-256: 86732c70bb900fae4bd00743a968a0b09c534dd36c4ddd506bfab76e701c10ef
ppc64le
qemu-img-rhev-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: df03ab0925de8a6f1612079f49c091a7f23b5de9b322018e8415c9b8802a1293
qemu-kvm-common-rhev-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: 5d760219869d1e9a7d741f3f58458b00d9bb2e378089ed7c79a9abd660afced2
qemu-kvm-rhev-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: 829e774ff216698470e4db6c9025ec8cb276b892b7cc653b2720feb99ca4caf9
qemu-kvm-rhev-debuginfo-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: c7b2021680501db6b7d4e77cafc3f59870921699e3dcbe18d8d107b317a9e392
qemu-kvm-tools-rhev-2.6.0-28.el7_3.10.ppc64le.rpm SHA-256: 051f5358e3b65332de792da6af255e3c12352238c8b6f79909202cc8f34a3ace

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Policy effective July 1st, 2023.
Red Hat Summit
Twitter