RHEL 6 : qemu-kvm (RHSA-2011:0534)

critical Nessus Plugin ID 63980

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2011:0534 advisory.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM.

It was found that the virtio-blk driver in qemu-kvm did not properly validate read and write requests from guests. A privileged guest user could use this flaw to crash the guest or, possibly, execute arbitrary code on the host. (CVE-2011-1750)

It was found that the PIIX4 Power Management emulation layer in qemu-kvm did not properly check for hot plug eligibility during device removals. A privileged guest user could use this flaw to crash the guest or, possibly, execute arbitrary code on the host. (CVE-2011-1751)

Red Hat would like to thank Nelson Elhage for reporting CVE-2011-1751.

This update also fixes several bugs and adds various enhancements.
Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section.

All users of qemu-kvm should upgrade to these updated packages, which contain backported patches to resolve these issues, and fix the bugs and add the enhancements noted in the Technical Notes. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected qemu-img, qemu-kvm and / or qemu-kvm-tools packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=599307

https://bugzilla.redhat.com/show_bug.cgi?id=602205

https://bugzilla.redhat.com/show_bug.cgi?id=603413

https://bugzilla.redhat.com/show_bug.cgi?id=604992

https://bugzilla.redhat.com/show_bug.cgi?id=607598

https://bugzilla.redhat.com/show_bug.cgi?id=608548

https://bugzilla.redhat.com/show_bug.cgi?id=609016

https://bugzilla.redhat.com/show_bug.cgi?id=613893

https://bugzilla.redhat.com/show_bug.cgi?id=615947

https://bugzilla.redhat.com/show_bug.cgi?id=616187

https://bugzilla.redhat.com/show_bug.cgi?id=616659

https://bugzilla.redhat.com/show_bug.cgi?id=616703

https://bugzilla.redhat.com/show_bug.cgi?id=617119

https://bugzilla.redhat.com/show_bug.cgi?id=619168

https://bugzilla.redhat.com/show_bug.cgi?id=619259

https://bugzilla.redhat.com/show_bug.cgi?id=623552

https://bugzilla.redhat.com/show_bug.cgi?id=623735

https://bugzilla.redhat.com/show_bug.cgi?id=624396

https://bugzilla.redhat.com/show_bug.cgi?id=624572

https://bugzilla.redhat.com/show_bug.cgi?id=624607

https://bugzilla.redhat.com/show_bug.cgi?id=624721

https://bugzilla.redhat.com/show_bug.cgi?id=624767

https://bugzilla.redhat.com/show_bug.cgi?id=624790

https://bugzilla.redhat.com/show_bug.cgi?id=625319

https://bugzilla.redhat.com/show_bug.cgi?id=625333

https://bugzilla.redhat.com/show_bug.cgi?id=670787

https://bugzilla.redhat.com/show_bug.cgi?id=671100

https://bugzilla.redhat.com/show_bug.cgi?id=672187

https://bugzilla.redhat.com/show_bug.cgi?id=672191

https://bugzilla.redhat.com/show_bug.cgi?id=672229

https://bugzilla.redhat.com/show_bug.cgi?id=672441

https://bugzilla.redhat.com/show_bug.cgi?id=672720

https://bugzilla.redhat.com/show_bug.cgi?id=674539

https://bugzilla.redhat.com/show_bug.cgi?id=674562

https://bugzilla.redhat.com/show_bug.cgi?id=675229

https://bugzilla.redhat.com/show_bug.cgi?id=676015

https://bugzilla.redhat.com/show_bug.cgi?id=676529

https://bugzilla.redhat.com/show_bug.cgi?id=677222

https://bugzilla.redhat.com/show_bug.cgi?id=677712

https://bugzilla.redhat.com/show_bug.cgi?id=678208

https://bugzilla.redhat.com/show_bug.cgi?id=678524

https://bugzilla.redhat.com/show_bug.cgi?id=680058

https://bugzilla.redhat.com/show_bug.cgi?id=681777

https://bugzilla.redhat.com/show_bug.cgi?id=683295

https://bugzilla.redhat.com/show_bug.cgi?id=684076

https://bugzilla.redhat.com/show_bug.cgi?id=685147

https://bugzilla.redhat.com/show_bug.cgi?id=688058

https://bugzilla.redhat.com/show_bug.cgi?id=688119

https://bugzilla.redhat.com/show_bug.cgi?id=688146

https://bugzilla.redhat.com/show_bug.cgi?id=688147

https://bugzilla.redhat.com/show_bug.cgi?id=688428

https://bugzilla.redhat.com/show_bug.cgi?id=688572

https://bugzilla.redhat.com/show_bug.cgi?id=690267

https://bugzilla.redhat.com/show_bug.cgi?id=693741

https://bugzilla.redhat.com/show_bug.cgi?id=694095

https://bugzilla.redhat.com/show_bug.cgi?id=694196

https://bugzilla.redhat.com/show_bug.cgi?id=698906

http://www.nessus.org/u?046847c8

http://www.nessus.org/u?a7e4e710

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=482427

https://bugzilla.redhat.com/show_bug.cgi?id=581750

https://bugzilla.redhat.com/show_bug.cgi?id=596610

https://bugzilla.redhat.com/show_bug.cgi?id=625681

https://bugzilla.redhat.com/show_bug.cgi?id=625948

https://bugzilla.redhat.com/show_bug.cgi?id=628634

https://bugzilla.redhat.com/show_bug.cgi?id=631522

https://bugzilla.redhat.com/show_bug.cgi?id=632257

https://bugzilla.redhat.com/show_bug.cgi?id=632458

https://bugzilla.redhat.com/show_bug.cgi?id=632722

https://bugzilla.redhat.com/show_bug.cgi?id=633394

https://bugzilla.redhat.com/show_bug.cgi?id=633699

https://bugzilla.redhat.com/show_bug.cgi?id=634153

https://bugzilla.redhat.com/show_bug.cgi?id=635354

https://bugzilla.redhat.com/show_bug.cgi?id=635418

https://bugzilla.redhat.com/show_bug.cgi?id=635527

https://bugzilla.redhat.com/show_bug.cgi?id=635954

https://bugzilla.redhat.com/show_bug.cgi?id=636494

https://bugzilla.redhat.com/show_bug.cgi?id=637180

https://bugzilla.redhat.com/show_bug.cgi?id=637976

https://bugzilla.redhat.com/show_bug.cgi?id=638468

https://bugzilla.redhat.com/show_bug.cgi?id=639437

https://bugzilla.redhat.com/show_bug.cgi?id=641127

https://bugzilla.redhat.com/show_bug.cgi?id=642131

https://bugzilla.redhat.com/show_bug.cgi?id=643681

https://bugzilla.redhat.com/show_bug.cgi?id=643687

https://bugzilla.redhat.com/show_bug.cgi?id=643970

https://bugzilla.redhat.com/show_bug.cgi?id=645342

https://bugzilla.redhat.com/show_bug.cgi?id=647307

https://bugzilla.redhat.com/show_bug.cgi?id=647308

https://bugzilla.redhat.com/show_bug.cgi?id=647447

https://bugzilla.redhat.com/show_bug.cgi?id=647865

https://bugzilla.redhat.com/show_bug.cgi?id=648333

https://bugzilla.redhat.com/show_bug.cgi?id=653582

https://bugzilla.redhat.com/show_bug.cgi?id=653972

https://bugzilla.redhat.com/show_bug.cgi?id=655735

https://bugzilla.redhat.com/show_bug.cgi?id=656198

https://bugzilla.redhat.com/show_bug.cgi?id=658288

https://bugzilla.redhat.com/show_bug.cgi?id=662633

https://bugzilla.redhat.com/show_bug.cgi?id=662701

https://bugzilla.redhat.com/show_bug.cgi?id=665025

https://bugzilla.redhat.com/show_bug.cgi?id=665299

https://bugzilla.redhat.com/show_bug.cgi?id=667188

https://bugzilla.redhat.com/show_bug.cgi?id=669268

https://bugzilla.redhat.com/show_bug.cgi?id=670539

https://bugzilla.redhat.com/show_bug.cgi?id=699773

https://access.redhat.com/errata/RHSA-2011:0534

Plugin Details

Severity: Critical

ID: 63980

File Name: redhat-RHSA-2011-0534.nasl

Version: 1.15

Type: local

Agent: unix

Published: 1/24/2013

Updated: 4/14/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.4

Temporal Score: 5.5

Vector: CVSS2#AV:A/AC:M/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2011-1751

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2011-1750

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:qemu-img, p-cpe:/a:redhat:enterprise_linux:qemu-kvm

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 5/19/2011

Vulnerability Publication Date: 6/21/2012

Reference Information

CVE: CVE-2011-1750, CVE-2011-1751

CWE: 119, 122

RHSA: 2011:0534