RHEL 5 : kvm (RHSA-2011:0028)

medium Nessus Plugin ID 63968

Synopsis

The remote Red Hat host is missing a security update for kvm.

Description

The remote Redhat Enterprise Linux 5 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2011:0028 advisory.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for the standard Red Hat Enterprise Linux kernel.

A data structure field in kvm_vcpu_ioctl_x86_get_vcpu_events() in QEMU-KVM was not initialized properly before being copied to user-space. A privileged host user with access to /dev/kvm could use this flaw to leak kernel stack memory to user-space. (CVE-2010-4525)

Red Hat would like to thank Stephan Mueller of atsec information security for reporting this issue.

These updated packages also fix several bugs. Documentation for these bug fixes will be available shortly in the kvm section of the Red Hat Enterprise Linux 5.6 Technical Notes, linked to in the References.

All KVM users should upgrade to these updated packages, which resolve this issue as well as fixing the bugs noted in the Technical Notes. Note: The procedure in the Solution section must be performed before this update will take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL kvm package based on the guidance in RHSA-2011:0028.

See Also

https://access.redhat.com/security/updates/classification/#low

https://bugzilla.redhat.com/show_bug.cgi?id=503118

https://bugzilla.redhat.com/show_bug.cgi?id=510630

https://bugzilla.redhat.com/show_bug.cgi?id=513765

https://bugzilla.redhat.com/show_bug.cgi?id=514578

https://bugzilla.redhat.com/show_bug.cgi?id=517565

https://bugzilla.redhat.com/show_bug.cgi?id=517814

https://bugzilla.redhat.com/show_bug.cgi?id=520572

https://bugzilla.redhat.com/show_bug.cgi?id=521247

https://bugzilla.redhat.com/show_bug.cgi?id=533078

https://bugzilla.redhat.com/show_bug.cgi?id=539642

https://bugzilla.redhat.com/show_bug.cgi?id=542954

https://bugzilla.redhat.com/show_bug.cgi?id=555727

https://bugzilla.redhat.com/show_bug.cgi?id=569743

https://bugzilla.redhat.com/show_bug.cgi?id=572825

https://bugzilla.redhat.com/show_bug.cgi?id=574621

https://bugzilla.redhat.com/show_bug.cgi?id=575585

https://bugzilla.redhat.com/show_bug.cgi?id=580410

https://bugzilla.redhat.com/show_bug.cgi?id=580637

https://bugzilla.redhat.com/show_bug.cgi?id=582038

https://bugzilla.redhat.com/show_bug.cgi?id=583947

https://bugzilla.redhat.com/show_bug.cgi?id=587604

https://bugzilla.redhat.com/show_bug.cgi?id=587605

https://bugzilla.redhat.com/show_bug.cgi?id=588251

https://bugzilla.redhat.com/show_bug.cgi?id=588878

https://bugzilla.redhat.com/show_bug.cgi?id=589017

https://bugzilla.redhat.com/show_bug.cgi?id=592021

https://bugzilla.redhat.com/show_bug.cgi?id=598042

https://bugzilla.redhat.com/show_bug.cgi?id=598488

https://bugzilla.redhat.com/show_bug.cgi?id=601494

https://bugzilla.redhat.com/show_bug.cgi?id=603026

https://bugzilla.redhat.com/show_bug.cgi?id=605701

https://bugzilla.redhat.com/show_bug.cgi?id=606238

https://bugzilla.redhat.com/show_bug.cgi?id=606394

https://bugzilla.redhat.com/show_bug.cgi?id=606434

https://bugzilla.redhat.com/show_bug.cgi?id=606651

https://bugzilla.redhat.com/show_bug.cgi?id=606953

https://bugzilla.redhat.com/show_bug.cgi?id=611982

https://bugzilla.redhat.com/show_bug.cgi?id=619268

https://bugzilla.redhat.com/show_bug.cgi?id=627343

https://bugzilla.redhat.com/show_bug.cgi?id=629333

https://bugzilla.redhat.com/show_bug.cgi?id=629334

https://bugzilla.redhat.com/show_bug.cgi?id=632707

https://bugzilla.redhat.com/show_bug.cgi?id=637267

https://bugzilla.redhat.com/show_bug.cgi?id=640949

https://bugzilla.redhat.com/show_bug.cgi?id=641823

https://bugzilla.redhat.com/show_bug.cgi?id=643272

https://bugzilla.redhat.com/show_bug.cgi?id=643317

https://bugzilla.redhat.com/show_bug.cgi?id=645798

https://bugzilla.redhat.com/show_bug.cgi?id=648328

https://bugzilla.redhat.com/show_bug.cgi?id=651715

https://bugzilla.redhat.com/show_bug.cgi?id=655990

https://bugzilla.redhat.com/show_bug.cgi?id=665470

http://www.nessus.org/u?629d010d

http://www.nessus.org/u?7784c161

https://access.redhat.com/errata/RHSA-2011:0028

Plugin Details

Severity: Medium

ID: 63968

File Name: redhat-RHSA-2011-0028.nasl

Version: 1.18

Type: local

Agent: unix

Published: 1/24/2013

Updated: 3/21/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Low

CVSS v2

Risk Factor: Low

Base Score: 1.9

Temporal Score: 1.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2010-4525

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kvm-tools, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:kvm, p-cpe:/a:redhat:enterprise_linux:kmod-kvm, p-cpe:/a:redhat:enterprise_linux:kmod-kvm-debug, p-cpe:/a:redhat:enterprise_linux:kvm-qemu-img

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 1/13/2011

Vulnerability Publication Date: 1/10/2011

Reference Information

CVE: CVE-2010-4525

BID: 45676

RHSA: 2011:0028