Scientific Linux Security Update : qemu-kvm on SL7.x x86_64 (20160811)

high Nessus Plugin ID 92998

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Security Fix(es) :

- Quick Emulator(Qemu) built with the Block driver for iSCSI images support (virtio-blk) is vulnerable to a heap buffer overflow issue. It could occur while processing iSCSI asynchronous I/O ioctl(2) calls. A user inside guest could use this flaw to crash the Qemu process resulting in DoS or potentially leverage it to execute arbitrary code with privileges of the Qemu process on the host. (CVE-2016-5126)

- Quick emulator(Qemu) built with the virtio framework is vulnerable to an unbounded memory allocation issue. It was found that a malicious guest user could submit more requests than the virtqueue size permits. Processing a request allocates a VirtQueueElement and therefore causes unbounded memory allocation on the host controlled by the guest. (CVE-2016-5403)

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?d549ef68

Plugin Details

Severity: High

ID: 92998

File Name: sl_20160811_qemu_kvm_on_SL7_x.nasl

Version: 2.5

Type: local

Agent: unix

Published: 8/17/2016

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: p-cpe:/a:fermilab:scientific_linux:libcacard-tools, p-cpe:/a:fermilab:scientific_linux:qemu-kvm-tools, x-cpe:/o:fermilab:scientific_linux, p-cpe:/a:fermilab:scientific_linux:qemu-kvm-common, p-cpe:/a:fermilab:scientific_linux:libcacard, p-cpe:/a:fermilab:scientific_linux:qemu-img, p-cpe:/a:fermilab:scientific_linux:qemu-kvm, p-cpe:/a:fermilab:scientific_linux:qemu-kvm-debuginfo, p-cpe:/a:fermilab:scientific_linux:libcacard-devel

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 8/11/2016

Vulnerability Publication Date: 6/1/2016

Reference Information

CVE: CVE-2016-5126, CVE-2016-5403