Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   Red Hat Enterprise Virtualization Vendors:   Red Hat
(Red Hat Issues Fix for RHEV) Linux Kernel ping_init_sock() Counter Overflow Lets Local Users Deny Service
SecurityTracker Alert ID:  1030828
SecurityTracker URL:
CVE Reference:   CVE-2014-2851   (Links to External Site)
Date:  Sep 10 2014
Impact:   Denial of service via local system
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): RHEL 6
Description:   A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. Red Hat Enterprise Virtualization is affected.

A local user can trigger a counter overflow in ping_init_sock() and cause the target system to crash.

Impact:   A local user can cause the target system to crash.
Solution:   Red Hat has issued a fix for Red Hat Enterprise Virtualization.

The Red Hat advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error

Message History:   This archive entry is a follow-up to the message listed below.
Aug 28 2014 Linux Kernel ping_init_sock() Counter Overflow Lets Local Users Deny Service

 Source Message Contents

Subject:  [RHSA-2014:1168-01] Important: rhev-hypervisor6 security and bug fix update

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Important: rhev-hypervisor6 security and bug fix update
Advisory ID:       RHSA-2014:1168-01
Product:           Red Hat Enterprise Virtualization
Advisory URL:
Issue date:        2014-09-09
CVE Names:         CVE-2014-0222 CVE-2014-0223 CVE-2014-3535 

1. Summary:

An updated rhev-hypervisor6 package that fixes three security issues and
one bug is now available.

Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.

2. Relevant releases/architectures:

RHEV Hypervisor for RHEL-6 - noarch

3. Description:

The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization
Hypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor
is a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes
everything necessary to run and manage virtual machines: a subset of the
Red Hat Enterprise Linux operating environment and the Red Hat Enterprise
Virtualization Agent.

Note: Red Hat Enterprise Virtualization Hypervisor is only available for
the Intel 64 and AMD64 architectures with virtualization extensions.

A NULL pointer dereference flaw was found in the way the Linux kernel's
networking implementation handled logging while processing certain invalid
packets coming in via a VxLAN interface. A remote attacker could use this
flaw to crash the system by sending a specially crafted packet to such an
interface. (CVE-2014-3535)

Two integer overflow flaws were found in the QEMU block driver for QCOW
version 1 disk images. A user able to alter the QEMU disk image files
loaded by a guest could use either of these flaws to corrupt QEMU process
memory on the host, which could potentially result in arbitrary code
execution on the host with the privileges of the QEMU process.
(CVE-2014-0222, CVE-2014-0223)

Red Hat would like to thank NSA for reporting CVE-2014-0222 and 

This update also fixes the following bug:

* Previously, an updated version of Qlogic firmware was not supported in
the Red Hat Enterprise Virtualization Hypervisor 6.5 image and an error
message returned when users were using a newer version of Qlogic firmware.
This update includes the latest Qlogic firmware package in the Red Hat
Enterprise Virtualization Hypervisor 6.5 image so no firmware errors are
returned. (BZ#1135780)

This updated package also provides updated components that include fixes
for various security issues. These issues have no security impact on Red
Hat Enterprise Virtualization Hypervisor itself, however. The security
fixes included in this update address the following CVE numbers:

CVE-2012-6647, CVE-2013-7339, CVE-2014-2672, CVE-2014-2678, CVE-2014-2706,
CVE-2014-2851, CVE-2014-3144, CVE-2014-3145, CVE-2014-0205, CVE-2014-3917,
and CVE-2014-4667 (kernel issues)

Users of the Red Hat Enterprise Virtualization Hypervisor are advised to
upgrade to this updated package.

4. Solution:

This update is available via the Red Hat Network. Details on how to use the
Red Hat Network to apply this update are available at

To upgrade Hypervisors in Red Hat Enterprise Virtualization environments
using the disk image provided by this package, refer to:

5. Bugs fixed (

1097216 - CVE-2014-0222 Qemu: qcow1: validate L2 table size to avoid integer overflows
1097222 - CVE-2014-0223 Qemu: qcow1: validate image size to avoid out-of-bounds memory access
1114540 - CVE-2014-3535 Kernel: netdevice.h: NULL pointer dereference over VxLAN
1127635 - Packaging for RHEV 3.4.2
1135780 - Requesting that a Qlogic firmware file be added to the RHEV-H 6.5 image.

6. Package List:

RHEV Hypervisor for RHEL-6:


These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from

7. References:

8. Contact:

The Red Hat security contact is <>.  More contact
details at

Copyright 2014 Red Hat, Inc.
Version: GnuPG v1


RHSA-announce mailing list

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, LLC