{"id":"RHSA-2014:0927","summary":"Red Hat Security Advisory: qemu-kvm security and bug fix update","modified":"2026-01-14T11:01:25.529317Z","published":"2024-09-15T21:49:26Z","upstream":["CVE-2013-4148","CVE-2013-4149","CVE-2013-4150","CVE-2013-4151","CVE-2013-4527","CVE-2013-4529","CVE-2013-4535","CVE-2013-4536","CVE-2013-4541","CVE-2013-4542","CVE-2013-6399","CVE-2014-0182","CVE-2014-0222","CVE-2014-0223","CVE-2014-3461"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2014:0927"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066334"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066337"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066340"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066347"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066353"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066382"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066384"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066401"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1088986"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1096821"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1097216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1097222"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1110188"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1110189"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1110191"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1110219"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_0927.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4148"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4148"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4148"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4149"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4149"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4149"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4150"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4150"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4150"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4151"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4151"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4151"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4527"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4527"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4527"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4529"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4529"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4529"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4535"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4535"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4535"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4536"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4536"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4541"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4541"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4542"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4542"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4542"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-6399"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-6399"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-6399"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0182"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0182"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0182"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0222"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0222"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0222"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0223"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0223"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0223"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-3461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-3461"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3461"}],"affected":[{"package":{"name":"libcacard","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/libcacard"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard-devel","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/libcacard-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard-tools","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/libcacard-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-guest-agent","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/qemu-guest-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-img","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/qemu-img"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/qemu-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-common","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/qemu-kvm-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/qemu-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-tools","ecosystem":"Red Hat:enterprise_linux:7::client","purl":"pkg:rpm/redhat/qemu-kvm-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/libcacard"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard-devel","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/libcacard-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard-tools","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/libcacard-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-guest-agent","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/qemu-guest-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-img","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/qemu-img"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/qemu-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-common","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/qemu-kvm-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/qemu-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-tools","ecosystem":"Red Hat:enterprise_linux:7::computenode","purl":"pkg:rpm/redhat/qemu-kvm-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/libcacard"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard-devel","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/libcacard-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard-tools","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/libcacard-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-guest-agent","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/qemu-guest-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-img","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/qemu-img"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/qemu-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-common","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/qemu-kvm-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/qemu-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-tools","ecosystem":"Red Hat:enterprise_linux:7::server","purl":"pkg:rpm/redhat/qemu-kvm-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/libcacard"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard-devel","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/libcacard-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"libcacard-tools","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/libcacard-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-guest-agent","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/qemu-guest-agent"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-img","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/qemu-img"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/qemu-kvm"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-common","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/qemu-kvm-common"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-debuginfo","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/qemu-kvm-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}},{"package":{"name":"qemu-kvm-tools","ecosystem":"Red Hat:enterprise_linux:7::workstation","purl":"pkg:rpm/redhat/qemu-kvm-tools"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.5"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:0927.json"}}],"schema_version":"1.7.3"}