RHSA-2011_0534

Vulnerability from csaf_redhat - Published: 2011-05-19 11:15 - Updated: 2024-11-22 03:59
Summary
Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update
Severity
Important
Notes
Topic: Updated qemu-kvm packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Details: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM. It was found that the virtio-blk driver in qemu-kvm did not properly validate read and write requests from guests. A privileged guest user could use this flaw to crash the guest or, possibly, execute arbitrary code on the host. (CVE-2011-1750) It was found that the PIIX4 Power Management emulation layer in qemu-kvm did not properly check for hot plug eligibility during device removals. A privileged guest user could use this flaw to crash the guest or, possibly, execute arbitrary code on the host. (CVE-2011-1751) Red Hat would like to thank Nelson Elhage for reporting CVE-2011-1751. This update also fixes several bugs and adds various enhancements. Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section. All users of qemu-kvm should upgrade to these updated packages, which contain backported patches to resolve these issues, and fix the bugs and add the enhancements noted in the Technical Notes. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.

CWE-122 - Heap-based Buffer Overflow
Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0534

The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to "active qemu timers."

CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Vendor Fix Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259 https://access.redhat.com/errata/RHSA-2011:0534
References
https://access.redhat.com/errata/RHSA-2011:0534 self
https://access.redhat.com/security/updates/classi… external
http://docs.redhat.com/docs/en-US/Red_Hat_Enterpr… external
https://bugzilla.redhat.com/show_bug.cgi?id=482427 external
https://bugzilla.redhat.com/show_bug.cgi?id=581750 external
https://bugzilla.redhat.com/show_bug.cgi?id=596610 external
https://bugzilla.redhat.com/show_bug.cgi?id=599307 external
https://bugzilla.redhat.com/show_bug.cgi?id=602205 external
https://bugzilla.redhat.com/show_bug.cgi?id=603413 external
https://bugzilla.redhat.com/show_bug.cgi?id=604992 external
https://bugzilla.redhat.com/show_bug.cgi?id=607598 external
https://bugzilla.redhat.com/show_bug.cgi?id=608548 external
https://bugzilla.redhat.com/show_bug.cgi?id=609016 external
https://bugzilla.redhat.com/show_bug.cgi?id=613893 external
https://bugzilla.redhat.com/show_bug.cgi?id=615947 external
https://bugzilla.redhat.com/show_bug.cgi?id=616187 external
https://bugzilla.redhat.com/show_bug.cgi?id=616659 external
https://bugzilla.redhat.com/show_bug.cgi?id=616703 external
https://bugzilla.redhat.com/show_bug.cgi?id=617119 external
https://bugzilla.redhat.com/show_bug.cgi?id=619168 external
https://bugzilla.redhat.com/show_bug.cgi?id=619259 external
https://bugzilla.redhat.com/show_bug.cgi?id=623552 external
https://bugzilla.redhat.com/show_bug.cgi?id=623735 external
https://bugzilla.redhat.com/show_bug.cgi?id=624396 external
https://bugzilla.redhat.com/show_bug.cgi?id=624572 external
https://bugzilla.redhat.com/show_bug.cgi?id=624607 external
https://bugzilla.redhat.com/show_bug.cgi?id=624721 external
https://bugzilla.redhat.com/show_bug.cgi?id=624767 external
https://bugzilla.redhat.com/show_bug.cgi?id=624790 external
https://bugzilla.redhat.com/show_bug.cgi?id=625319 external
https://bugzilla.redhat.com/show_bug.cgi?id=625333 external
https://bugzilla.redhat.com/show_bug.cgi?id=625681 external
https://bugzilla.redhat.com/show_bug.cgi?id=625948 external
https://bugzilla.redhat.com/show_bug.cgi?id=628634 external
https://bugzilla.redhat.com/show_bug.cgi?id=631522 external
https://bugzilla.redhat.com/show_bug.cgi?id=632257 external
https://bugzilla.redhat.com/show_bug.cgi?id=632458 external
https://bugzilla.redhat.com/show_bug.cgi?id=632722 external
https://bugzilla.redhat.com/show_bug.cgi?id=633394 external
https://bugzilla.redhat.com/show_bug.cgi?id=633699 external
https://bugzilla.redhat.com/show_bug.cgi?id=634153 external
https://bugzilla.redhat.com/show_bug.cgi?id=635354 external
https://bugzilla.redhat.com/show_bug.cgi?id=635418 external
https://bugzilla.redhat.com/show_bug.cgi?id=635527 external
https://bugzilla.redhat.com/show_bug.cgi?id=635954 external
https://bugzilla.redhat.com/show_bug.cgi?id=636494 external
https://bugzilla.redhat.com/show_bug.cgi?id=637180 external
https://bugzilla.redhat.com/show_bug.cgi?id=637976 external
https://bugzilla.redhat.com/show_bug.cgi?id=638468 external
https://bugzilla.redhat.com/show_bug.cgi?id=639437 external
https://bugzilla.redhat.com/show_bug.cgi?id=641127 external
https://bugzilla.redhat.com/show_bug.cgi?id=642131 external
https://bugzilla.redhat.com/show_bug.cgi?id=643681 external
https://bugzilla.redhat.com/show_bug.cgi?id=643687 external
https://bugzilla.redhat.com/show_bug.cgi?id=643970 external
https://bugzilla.redhat.com/show_bug.cgi?id=645342 external
https://bugzilla.redhat.com/show_bug.cgi?id=647307 external
https://bugzilla.redhat.com/show_bug.cgi?id=647308 external
https://bugzilla.redhat.com/show_bug.cgi?id=647447 external
https://bugzilla.redhat.com/show_bug.cgi?id=647865 external
https://bugzilla.redhat.com/show_bug.cgi?id=648333 external
https://bugzilla.redhat.com/show_bug.cgi?id=653582 external
https://bugzilla.redhat.com/show_bug.cgi?id=653972 external
https://bugzilla.redhat.com/show_bug.cgi?id=655735 external
https://bugzilla.redhat.com/show_bug.cgi?id=656198 external
https://bugzilla.redhat.com/show_bug.cgi?id=658288 external
https://bugzilla.redhat.com/show_bug.cgi?id=662633 external
https://bugzilla.redhat.com/show_bug.cgi?id=662701 external
https://bugzilla.redhat.com/show_bug.cgi?id=665025 external
https://bugzilla.redhat.com/show_bug.cgi?id=665299 external
https://bugzilla.redhat.com/show_bug.cgi?id=667188 external
https://bugzilla.redhat.com/show_bug.cgi?id=669268 external
https://bugzilla.redhat.com/show_bug.cgi?id=670539 external
https://bugzilla.redhat.com/show_bug.cgi?id=670787 external
https://bugzilla.redhat.com/show_bug.cgi?id=671100 external
https://bugzilla.redhat.com/show_bug.cgi?id=672187 external
https://bugzilla.redhat.com/show_bug.cgi?id=672191 external
https://bugzilla.redhat.com/show_bug.cgi?id=672229 external
https://bugzilla.redhat.com/show_bug.cgi?id=672441 external
https://bugzilla.redhat.com/show_bug.cgi?id=672720 external
https://bugzilla.redhat.com/show_bug.cgi?id=674539 external
https://bugzilla.redhat.com/show_bug.cgi?id=674562 external
https://bugzilla.redhat.com/show_bug.cgi?id=675229 external
https://bugzilla.redhat.com/show_bug.cgi?id=676015 external
https://bugzilla.redhat.com/show_bug.cgi?id=676529 external
https://bugzilla.redhat.com/show_bug.cgi?id=677222 external
https://bugzilla.redhat.com/show_bug.cgi?id=677712 external
https://bugzilla.redhat.com/show_bug.cgi?id=678208 external
https://bugzilla.redhat.com/show_bug.cgi?id=678524 external
https://bugzilla.redhat.com/show_bug.cgi?id=680058 external
https://bugzilla.redhat.com/show_bug.cgi?id=681777 external
https://bugzilla.redhat.com/show_bug.cgi?id=683295 external
https://bugzilla.redhat.com/show_bug.cgi?id=684076 external
https://bugzilla.redhat.com/show_bug.cgi?id=685147 external
https://bugzilla.redhat.com/show_bug.cgi?id=688058 external
https://bugzilla.redhat.com/show_bug.cgi?id=688119 external
https://bugzilla.redhat.com/show_bug.cgi?id=688146 external
https://bugzilla.redhat.com/show_bug.cgi?id=688147 external
https://bugzilla.redhat.com/show_bug.cgi?id=688428 external
https://bugzilla.redhat.com/show_bug.cgi?id=688572 external
https://bugzilla.redhat.com/show_bug.cgi?id=690267 external
https://bugzilla.redhat.com/show_bug.cgi?id=693741 external
https://bugzilla.redhat.com/show_bug.cgi?id=694095 external
https://bugzilla.redhat.com/show_bug.cgi?id=694196 external
https://bugzilla.redhat.com/show_bug.cgi?id=698906 external
https://bugzilla.redhat.com/show_bug.cgi?id=699773 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2011-1750 self
https://bugzilla.redhat.com/show_bug.cgi?id=698906 external
https://www.cve.org/CVERecord?id=CVE-2011-1750 external
https://nvd.nist.gov/vuln/detail/CVE-2011-1750 external
https://access.redhat.com/security/cve/CVE-2011-1751 self
https://bugzilla.redhat.com/show_bug.cgi?id=699773 external
https://www.cve.org/CVERecord?id=CVE-2011-1751 external
https://nvd.nist.gov/vuln/detail/CVE-2011-1751 external
Acknowledgments
Nelson Elhage

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Updated qemu-kvm packages that fix two security issues, several bugs, and\nadd various enhancements are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "KVM (Kernel-based Virtual Machine) is a full virtualization solution for\nLinux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component\nfor running virtual machines using KVM.\n\nIt was found that the virtio-blk driver in qemu-kvm did not properly\nvalidate read and write requests from guests. A privileged guest user could\nuse this flaw to crash the guest or, possibly, execute arbitrary code on\nthe host. (CVE-2011-1750)\n\nIt was found that the PIIX4 Power Management emulation layer in qemu-kvm\ndid not properly check for hot plug eligibility during device removals. A\nprivileged guest user could use this flaw to crash the guest or, possibly,\nexecute arbitrary code on the host. (CVE-2011-1751)\n\nRed Hat would like to thank Nelson Elhage for reporting CVE-2011-1751.\n\nThis update also fixes several bugs and adds various enhancements.\nDocumentation for these bug fixes and enhancements will be available\nshortly from the Technical Notes document, linked to in the References\nsection.\n\nAll users of qemu-kvm should upgrade to these updated packages, which\ncontain backported patches to resolve these issues, and fix the bugs and\nadd the enhancements noted in the Technical Notes. After installing this\nupdate, shut down all running virtual machines. Once all virtual machines\nhave shut down, start them again for this update to take effect.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2011:0534",
        "url": "https://access.redhat.com/errata/RHSA-2011:0534"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.1_Technical_Notes/index.html",
        "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/6.1_Technical_Notes/index.html"
      },
      {
        "category": "external",
        "summary": "482427",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=482427"
      },
      {
        "category": "external",
        "summary": "581750",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=581750"
      },
      {
        "category": "external",
        "summary": "596610",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=596610"
      },
      {
        "category": "external",
        "summary": "599307",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=599307"
      },
      {
        "category": "external",
        "summary": "602205",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=602205"
      },
      {
        "category": "external",
        "summary": "603413",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=603413"
      },
      {
        "category": "external",
        "summary": "604992",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=604992"
      },
      {
        "category": "external",
        "summary": "607598",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=607598"
      },
      {
        "category": "external",
        "summary": "608548",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=608548"
      },
      {
        "category": "external",
        "summary": "609016",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=609016"
      },
      {
        "category": "external",
        "summary": "613893",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=613893"
      },
      {
        "category": "external",
        "summary": "615947",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=615947"
      },
      {
        "category": "external",
        "summary": "616187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=616187"
      },
      {
        "category": "external",
        "summary": "616659",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=616659"
      },
      {
        "category": "external",
        "summary": "616703",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=616703"
      },
      {
        "category": "external",
        "summary": "617119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=617119"
      },
      {
        "category": "external",
        "summary": "619168",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=619168"
      },
      {
        "category": "external",
        "summary": "619259",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=619259"
      },
      {
        "category": "external",
        "summary": "623552",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=623552"
      },
      {
        "category": "external",
        "summary": "623735",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=623735"
      },
      {
        "category": "external",
        "summary": "624396",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624396"
      },
      {
        "category": "external",
        "summary": "624572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624572"
      },
      {
        "category": "external",
        "summary": "624607",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624607"
      },
      {
        "category": "external",
        "summary": "624721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624721"
      },
      {
        "category": "external",
        "summary": "624767",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624767"
      },
      {
        "category": "external",
        "summary": "624790",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624790"
      },
      {
        "category": "external",
        "summary": "625319",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625319"
      },
      {
        "category": "external",
        "summary": "625333",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625333"
      },
      {
        "category": "external",
        "summary": "625681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625681"
      },
      {
        "category": "external",
        "summary": "625948",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=625948"
      },
      {
        "category": "external",
        "summary": "628634",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628634"
      },
      {
        "category": "external",
        "summary": "631522",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=631522"
      },
      {
        "category": "external",
        "summary": "632257",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632257"
      },
      {
        "category": "external",
        "summary": "632458",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632458"
      },
      {
        "category": "external",
        "summary": "632722",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632722"
      },
      {
        "category": "external",
        "summary": "633394",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633394"
      },
      {
        "category": "external",
        "summary": "633699",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633699"
      },
      {
        "category": "external",
        "summary": "634153",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634153"
      },
      {
        "category": "external",
        "summary": "635354",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=635354"
      },
      {
        "category": "external",
        "summary": "635418",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=635418"
      },
      {
        "category": "external",
        "summary": "635527",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=635527"
      },
      {
        "category": "external",
        "summary": "635954",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=635954"
      },
      {
        "category": "external",
        "summary": "636494",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=636494"
      },
      {
        "category": "external",
        "summary": "637180",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637180"
      },
      {
        "category": "external",
        "summary": "637976",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637976"
      },
      {
        "category": "external",
        "summary": "638468",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638468"
      },
      {
        "category": "external",
        "summary": "639437",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639437"
      },
      {
        "category": "external",
        "summary": "641127",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641127"
      },
      {
        "category": "external",
        "summary": "642131",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642131"
      },
      {
        "category": "external",
        "summary": "643681",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643681"
      },
      {
        "category": "external",
        "summary": "643687",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643687"
      },
      {
        "category": "external",
        "summary": "643970",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=643970"
      },
      {
        "category": "external",
        "summary": "645342",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=645342"
      },
      {
        "category": "external",
        "summary": "647307",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647307"
      },
      {
        "category": "external",
        "summary": "647308",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647308"
      },
      {
        "category": "external",
        "summary": "647447",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647447"
      },
      {
        "category": "external",
        "summary": "647865",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=647865"
      },
      {
        "category": "external",
        "summary": "648333",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=648333"
      },
      {
        "category": "external",
        "summary": "653582",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=653582"
      },
      {
        "category": "external",
        "summary": "653972",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=653972"
      },
      {
        "category": "external",
        "summary": "655735",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=655735"
      },
      {
        "category": "external",
        "summary": "656198",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656198"
      },
      {
        "category": "external",
        "summary": "658288",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=658288"
      },
      {
        "category": "external",
        "summary": "662633",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662633"
      },
      {
        "category": "external",
        "summary": "662701",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662701"
      },
      {
        "category": "external",
        "summary": "665025",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665025"
      },
      {
        "category": "external",
        "summary": "665299",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=665299"
      },
      {
        "category": "external",
        "summary": "667188",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667188"
      },
      {
        "category": "external",
        "summary": "669268",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=669268"
      },
      {
        "category": "external",
        "summary": "670539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670539"
      },
      {
        "category": "external",
        "summary": "670787",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670787"
      },
      {
        "category": "external",
        "summary": "671100",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=671100"
      },
      {
        "category": "external",
        "summary": "672187",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672187"
      },
      {
        "category": "external",
        "summary": "672191",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672191"
      },
      {
        "category": "external",
        "summary": "672229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672229"
      },
      {
        "category": "external",
        "summary": "672441",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672441"
      },
      {
        "category": "external",
        "summary": "672720",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672720"
      },
      {
        "category": "external",
        "summary": "674539",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674539"
      },
      {
        "category": "external",
        "summary": "674562",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674562"
      },
      {
        "category": "external",
        "summary": "675229",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675229"
      },
      {
        "category": "external",
        "summary": "676015",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676015"
      },
      {
        "category": "external",
        "summary": "676529",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676529"
      },
      {
        "category": "external",
        "summary": "677222",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677222"
      },
      {
        "category": "external",
        "summary": "677712",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677712"
      },
      {
        "category": "external",
        "summary": "678208",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678208"
      },
      {
        "category": "external",
        "summary": "678524",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=678524"
      },
      {
        "category": "external",
        "summary": "680058",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680058"
      },
      {
        "category": "external",
        "summary": "681777",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681777"
      },
      {
        "category": "external",
        "summary": "683295",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=683295"
      },
      {
        "category": "external",
        "summary": "684076",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684076"
      },
      {
        "category": "external",
        "summary": "685147",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=685147"
      },
      {
        "category": "external",
        "summary": "688058",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688058"
      },
      {
        "category": "external",
        "summary": "688119",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688119"
      },
      {
        "category": "external",
        "summary": "688146",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688146"
      },
      {
        "category": "external",
        "summary": "688147",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688147"
      },
      {
        "category": "external",
        "summary": "688428",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688428"
      },
      {
        "category": "external",
        "summary": "688572",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=688572"
      },
      {
        "category": "external",
        "summary": "690267",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690267"
      },
      {
        "category": "external",
        "summary": "693741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=693741"
      },
      {
        "category": "external",
        "summary": "694095",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694095"
      },
      {
        "category": "external",
        "summary": "694196",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694196"
      },
      {
        "category": "external",
        "summary": "698906",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698906"
      },
      {
        "category": "external",
        "summary": "699773",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699773"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0534.json"
      }
    ],
    "title": "Red Hat Security Advisory: qemu-kvm security, bug fix, and enhancement update",
    "tracking": {
      "current_release_date": "2024-11-22T03:59:10+00:00",
      "generator": {
        "date": "2024-11-22T03:59:10+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.2.1"
        }
      },
      "id": "RHSA-2011:0534",
      "initial_release_date": "2011-05-19T11:15:00+00:00",
      "revision_history": [
        {
          "date": "2011-05-19T11:15:00+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2011-05-19T07:20:36+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2024-11-22T03:59:10+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Desktop (v. 6)",
                  "product_id": "6Client",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::client"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux HPC Node (v. 6)",
                  "product_id": "6ComputeNode",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Server (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Server (v. 6)",
                  "product_id": "6Server",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::server"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                "product": {
                  "name": "Red Hat Enterprise Linux Workstation (v. 6)",
                  "product_id": "6Workstation",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
                "product": {
                  "name": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
                  "product_id": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/qemu-kvm-tools@0.12.1.2-2.160.el6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "qemu-img-2:0.12.1.2-2.160.el6.x86_64",
                "product": {
                  "name": "qemu-img-2:0.12.1.2-2.160.el6.x86_64",
                  "product_id": "qemu-img-2:0.12.1.2-2.160.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/qemu-img@0.12.1.2-2.160.el6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
                "product": {
                  "name": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
                  "product_id": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.160.el6?arch=x86_64\u0026epoch=2"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
                "product": {
                  "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
                  "product_id": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/qemu-kvm-debuginfo@0.12.1.2-2.160.el6?arch=x86_64\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "qemu-kvm-2:0.12.1.2-2.160.el6.src",
                "product": {
                  "name": "qemu-kvm-2:0.12.1.2-2.160.el6.src",
                  "product_id": "qemu-kvm-2:0.12.1.2-2.160.el6.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/qemu-kvm@0.12.1.2-2.160.el6?arch=src\u0026epoch=2"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-img-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client:qemu-img-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-img-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-2:0.12.1.2-2.160.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.src"
        },
        "product_reference": "qemu-kvm-2:0.12.1.2-2.160.el6.src",
        "relates_to_product_reference": "6Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
          "product_id": "6Client:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Client"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-img-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode:qemu-img-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-img-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-2:0.12.1.2-2.160.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.src"
        },
        "product_reference": "qemu-kvm-2:0.12.1.2-2.160.el6.src",
        "relates_to_product_reference": "6ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
          "product_id": "6ComputeNode:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6ComputeNode"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-img-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:qemu-img-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-img-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-2:0.12.1.2-2.160.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.src"
        },
        "product_reference": "qemu-kvm-2:0.12.1.2-2.160.el6.src",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
          "product_id": "6Server:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Server"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-img-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:qemu-img-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-img-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-2:0.12.1.2-2.160.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.src"
        },
        "product_reference": "qemu-kvm-2:0.12.1.2-2.160.el6.src",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Workstation"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
          "product_id": "6Workstation:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
        },
        "product_reference": "qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
        "relates_to_product_reference": "6Workstation"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2011-1750",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "discovery_date": "2011-03-30T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "698906"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "Multiple heap-based buffer overflows in the virtio-blk driver (hw/virtio-blk.c) in qemu-kvm 0.14.0 allow local guest users to cause a denial of service (guest crash) and possibly gain privileges via a (1) write request to the virtio_blk_handle_write function or (2) read request to the virtio_blk_handle_read function that is not properly aligned.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "virtio-blk: heap buffer overflow caused by unaligned requests",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue does not affect versions of kvm package as shipped with Red Hat\nEnterprise Linux 5.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
          "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.src",
          "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
          "6Client:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
          "6Client:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
          "6ComputeNode:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
          "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.src",
          "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
          "6ComputeNode:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
          "6ComputeNode:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
          "6Server:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
          "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.src",
          "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
          "6Server:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
          "6Server:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
          "6Workstation:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
          "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.src",
          "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
          "6Workstation:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
          "6Workstation:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1750"
        },
        {
          "category": "external",
          "summary": "RHBZ#698906",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698906"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1750",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1750"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1750",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1750"
        }
      ],
      "release_date": "2011-03-30T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-05-19T11:15:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "6Client:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0534"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.4,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "6Client:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "virtio-blk: heap buffer overflow caused by unaligned requests"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Nelson Elhage"
          ]
        }
      ],
      "cve": "CVE-2011-1751",
      "cwe": {
        "id": "CWE-119",
        "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
      },
      "discovery_date": "2011-04-25T00:00:00+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "699773"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "The pciej_write function in hw/acpi_piix4.c in the PIIX4 Power Management emulation in qemu-kvm does not check if a device is hotpluggable before unplugging the PCI-ISA bridge, which allows privileged guest users to cause a denial of service (guest crash) and possibly execute arbitrary code by sending a crafted value to the 0xae08 (PCI_EJ_BASE) I/O port, which leads to a use-after-free related to \"active qemu timers.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "qemu: acpi_piix4: missing hotplug check during device removal",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "This issue only affects Red Hat Enterprise Linux 6. The version of the qemu/kvm as shipped with Red Hat Enterprise Linux 5 is not affected.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "6Client:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
          "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.src",
          "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
          "6Client:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
          "6Client:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
          "6ComputeNode:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
          "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.src",
          "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
          "6ComputeNode:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
          "6ComputeNode:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
          "6Server:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
          "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.src",
          "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
          "6Server:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
          "6Server:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
          "6Workstation:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
          "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.src",
          "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
          "6Workstation:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
          "6Workstation:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2011-1751"
        },
        {
          "category": "external",
          "summary": "RHBZ#699773",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=699773"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1751",
          "url": "https://www.cve.org/CVERecord?id=CVE-2011-1751"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1751",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1751"
        }
      ],
      "release_date": "2011-05-18T00:00:00+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2011-05-19T11:15:00+00:00",
          "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
          "product_ids": [
            "6Client:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2011:0534"
        }
      ],
      "scores": [
        {
          "cvss_v2": {
            "accessComplexity": "MEDIUM",
            "accessVector": "ADJACENT_NETWORK",
            "authentication": "SINGLE",
            "availabilityImpact": "COMPLETE",
            "baseScore": 7.4,
            "confidentialityImpact": "COMPLETE",
            "integrityImpact": "COMPLETE",
            "vectorString": "AV:A/AC:M/Au:S/C:C/I:C/A:C",
            "version": "2.0"
          },
          "products": [
            "6Client:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Client:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Client:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6ComputeNode:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6ComputeNode:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Server:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Server:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-img-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.src",
            "6Workstation:qemu-kvm-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-debuginfo-2:0.12.1.2-2.160.el6.x86_64",
            "6Workstation:qemu-kvm-tools-2:0.12.1.2-2.160.el6.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "qemu: acpi_piix4: missing hotplug check during device removal"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…