{"id":"RHSA-2014:1268","summary":"Red Hat Security Advisory: qemu-kvm-rhev security update","modified":"2026-01-14T11:01:28.166229Z","published":"2024-09-15T21:49:32Z","upstream":["CVE-2013-4148","CVE-2013-4149","CVE-2013-4150","CVE-2013-4151","CVE-2013-4527","CVE-2013-4529","CVE-2013-4535","CVE-2013-4536","CVE-2013-4541","CVE-2013-4542","CVE-2013-6399","CVE-2014-0182","CVE-2014-0222","CVE-2014-0223","CVE-2014-3461"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2014:1268"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066334"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066337"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066340"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066342"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066347"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066353"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066361"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066382"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066384"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1066401"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1088986"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1096821"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1097216"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1097222"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1268.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4148"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4148"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4148"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4149"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4149"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4149"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4150"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4150"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4150"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4151"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4151"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4151"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4527"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4527"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4527"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4529"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4529"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4529"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4535"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4535"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4535"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4536"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4536"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4536"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4541"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4541"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4541"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-4542"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-4542"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-4542"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2013-6399"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2013-6399"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2013-6399"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0182"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0182"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0182"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0222"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0222"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0222"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-0223"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-0223"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-0223"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2014-3461"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2014-3461"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2014-3461"}],"affected":[{"package":{"name":"libcacard-devel-rhev","ecosystem":"Red Hat:openstack:5::el7","purl":"pkg:rpm/redhat/libcacard-devel-rhev"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:1268.json"}},{"package":{"name":"libcacard-rhev","ecosystem":"Red Hat:openstack:5::el7","purl":"pkg:rpm/redhat/libcacard-rhev"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:1268.json"}},{"package":{"name":"libcacard-tools-rhev","ecosystem":"Red Hat:openstack:5::el7","purl":"pkg:rpm/redhat/libcacard-tools-rhev"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:1268.json"}},{"package":{"name":"qemu-img-rhev","ecosystem":"Red Hat:openstack:5::el7","purl":"pkg:rpm/redhat/qemu-img-rhev"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:1268.json"}},{"package":{"name":"qemu-kvm-common-rhev","ecosystem":"Red Hat:openstack:5::el7","purl":"pkg:rpm/redhat/qemu-kvm-common-rhev"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:1268.json"}},{"package":{"name":"qemu-kvm-rhev","ecosystem":"Red Hat:openstack:5::el7","purl":"pkg:rpm/redhat/qemu-kvm-rhev"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:1268.json"}},{"package":{"name":"qemu-kvm-rhev-debuginfo","ecosystem":"Red Hat:openstack:5::el7","purl":"pkg:rpm/redhat/qemu-kvm-rhev-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:1268.json"}},{"package":{"name":"qemu-kvm-tools-rhev","ecosystem":"Red Hat:openstack:5::el7","purl":"pkg:rpm/redhat/qemu-kvm-tools-rhev"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"10:1.5.3-60.el7_0.7"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2014:1268.json"}}],"schema_version":"1.7.3"}