RHEL 6 : qemu-kvm (RHSA-2011:1531)

medium Nessus Plugin ID 64006

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2011:1531 advisory.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component for running virtual machines using KVM.

It was found that qemu-kvm did not properly drop supplemental group privileges when the root user started guests from the command line (/usr/libexec/qemu-kvm) with the -runas option. A qemu-kvm process started this way could use this flaw to gain access to files on the host that are accessible to the supplementary groups and not accessible to the primary group. (CVE-2011-2527)

Note: This issue only affected qemu-kvm when it was started directly from the command line. It did not affect the Red Hat Enterprise Virtualization platform or applications that start qemu-kvm via libvirt, such as the Virtual Machine Manager (virt-manager).

This update also fixes several bugs and adds various enhancements.
Documentation for these bug fixes and enhancements will be available shortly from the Technical Notes document, linked to in the References section.

All users of qemu-kvm are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected qemu-img, qemu-kvm and / or qemu-kvm-tools packages.

See Also

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=561414

https://bugzilla.redhat.com/show_bug.cgi?id=599306

https://bugzilla.redhat.com/show_bug.cgi?id=609342

https://bugzilla.redhat.com/show_bug.cgi?id=621482

https://bugzilla.redhat.com/show_bug.cgi?id=624983

https://bugzilla.redhat.com/show_bug.cgi?id=627585

https://bugzilla.redhat.com/show_bug.cgi?id=633370

https://bugzilla.redhat.com/show_bug.cgi?id=633380

https://bugzilla.redhat.com/show_bug.cgi?id=645351

https://bugzilla.redhat.com/show_bug.cgi?id=655719

https://bugzilla.redhat.com/show_bug.cgi?id=656779

https://bugzilla.redhat.com/show_bug.cgi?id=658467

https://bugzilla.redhat.com/show_bug.cgi?id=669581

https://bugzilla.redhat.com/show_bug.cgi?id=676982

https://bugzilla.redhat.com/show_bug.cgi?id=678729

https://bugzilla.redhat.com/show_bug.cgi?id=678731

https://bugzilla.redhat.com/show_bug.cgi?id=680378

https://bugzilla.redhat.com/show_bug.cgi?id=681736

https://bugzilla.redhat.com/show_bug.cgi?id=682227

https://bugzilla.redhat.com/show_bug.cgi?id=693645

https://bugzilla.redhat.com/show_bug.cgi?id=694373

https://bugzilla.redhat.com/show_bug.cgi?id=694378

https://bugzilla.redhat.com/show_bug.cgi?id=698537

https://bugzilla.redhat.com/show_bug.cgi?id=700134

https://bugzilla.redhat.com/show_bug.cgi?id=705070

https://bugzilla.redhat.com/show_bug.cgi?id=707130

https://bugzilla.redhat.com/show_bug.cgi?id=709397

https://bugzilla.redhat.com/show_bug.cgi?id=710046

https://bugzilla.redhat.com/show_bug.cgi?id=711354

https://bugzilla.redhat.com/show_bug.cgi?id=712046

https://bugzilla.redhat.com/show_bug.cgi?id=714773

https://bugzilla.redhat.com/show_bug.cgi?id=715017

https://bugzilla.redhat.com/show_bug.cgi?id=715141

https://bugzilla.redhat.com/show_bug.cgi?id=715582

https://bugzilla.redhat.com/show_bug.cgi?id=717958

https://bugzilla.redhat.com/show_bug.cgi?id=718664

https://bugzilla.redhat.com/show_bug.cgi?id=720237

https://bugzilla.redhat.com/show_bug.cgi?id=720773

https://bugzilla.redhat.com/show_bug.cgi?id=720979

https://bugzilla.redhat.com/show_bug.cgi?id=722728

https://bugzilla.redhat.com/show_bug.cgi?id=723270

https://bugzilla.redhat.com/show_bug.cgi?id=723858

https://bugzilla.redhat.com/show_bug.cgi?id=723863

https://bugzilla.redhat.com/show_bug.cgi?id=723864

https://bugzilla.redhat.com/show_bug.cgi?id=723870

https://bugzilla.redhat.com/show_bug.cgi?id=725565

https://bugzilla.redhat.com/show_bug.cgi?id=725625

https://bugzilla.redhat.com/show_bug.cgi?id=725965

https://bugzilla.redhat.com/show_bug.cgi?id=726014

https://bugzilla.redhat.com/show_bug.cgi?id=726015

https://bugzilla.redhat.com/show_bug.cgi?id=726020

https://bugzilla.redhat.com/show_bug.cgi?id=726023

https://bugzilla.redhat.com/show_bug.cgi?id=728120

https://bugzilla.redhat.com/show_bug.cgi?id=728464

https://bugzilla.redhat.com/show_bug.cgi?id=729104

https://bugzilla.redhat.com/show_bug.cgi?id=729572

https://bugzilla.redhat.com/show_bug.cgi?id=729621

https://bugzilla.redhat.com/show_bug.cgi?id=729869

https://bugzilla.redhat.com/show_bug.cgi?id=729969

https://bugzilla.redhat.com/show_bug.cgi?id=731759

https://bugzilla.redhat.com/show_bug.cgi?id=732949

https://bugzilla.redhat.com/show_bug.cgi?id=733010

https://bugzilla.redhat.com/show_bug.cgi?id=733993

https://bugzilla.redhat.com/show_bug.cgi?id=734860

https://bugzilla.redhat.com/show_bug.cgi?id=734995

https://bugzilla.redhat.com/show_bug.cgi?id=735716

https://bugzilla.redhat.com/show_bug.cgi?id=736975

https://bugzilla.redhat.com/show_bug.cgi?id=737921

https://bugzilla.redhat.com/show_bug.cgi?id=738487

https://bugzilla.redhat.com/show_bug.cgi?id=738555

https://bugzilla.redhat.com/show_bug.cgi?id=739480

https://bugzilla.redhat.com/show_bug.cgi?id=740547

https://bugzilla.redhat.com/show_bug.cgi?id=741878

https://bugzilla.redhat.com/show_bug.cgi?id=742401

https://bugzilla.redhat.com/show_bug.cgi?id=742458

https://bugzilla.redhat.com/show_bug.cgi?id=742469

https://bugzilla.redhat.com/show_bug.cgi?id=742476

https://bugzilla.redhat.com/show_bug.cgi?id=742480

https://bugzilla.redhat.com/show_bug.cgi?id=742484

https://bugzilla.redhat.com/show_bug.cgi?id=743269

https://bugzilla.redhat.com/show_bug.cgi?id=743342

https://bugzilla.redhat.com/show_bug.cgi?id=743391

https://bugzilla.redhat.com/show_bug.cgi?id=744518

https://bugzilla.redhat.com/show_bug.cgi?id=744780

http://www.nessus.org/u?06f690f6

http://www.nessus.org/u?c7a9bbed

https://access.redhat.com/errata/RHSA-2011:1531

Plugin Details

Severity: Medium

ID: 64006

File Name: redhat-RHSA-2011-1531.nasl

Version: 1.19

Type: local

Agent: unix

Published: 1/24/2013

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2011-2527

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:qemu-kvm-tools, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:qemu-img, p-cpe:/a:redhat:enterprise_linux:qemu-kvm

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 12/6/2011

Vulnerability Publication Date: 6/21/2012

Reference Information

CVE: CVE-2011-2527

BID: 48659

RHSA: 2011:1531