Lucene search

K
openvasCopyright (C) 2012 Greenbone AGOPENVAS:1361412562310870724
HistoryJul 09, 2012 - 12:00 a.m.

RedHat Update for qemu-kvm RHSA-2011:1531-03

2012-07-0900:00:00
Copyright (C) 2012 Greenbone AG
plugins.openvas.org
10

6.5 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

27.6%

The remote host is missing an update for the

# SPDX-FileCopyrightText: 2012 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

if(description)
{
  script_xref(name:"URL", value:"https://www.redhat.com/archives/rhsa-announce/2011-December/msg00006.html");
  script_oid("1.3.6.1.4.1.25623.1.0.870724");
  script_version("2024-03-21T05:06:54+0000");
  script_tag(name:"last_modification", value:"2024-03-21 05:06:54 +0000 (Thu, 21 Mar 2024)");
  script_tag(name:"creation_date", value:"2012-07-09 10:53:34 +0530 (Mon, 09 Jul 2012)");
  script_tag(name:"cvss_base", value:"2.1");
  script_tag(name:"cvss_base_vector", value:"AV:L/AC:L/Au:N/C:P/I:N/A:N");
  script_cve_id("CVE-2011-2527");
  script_xref(name:"RHSA", value:"2011:1531-03");
  script_name("RedHat Update for qemu-kvm RHSA-2011:1531-03");

  script_tag(name:"summary", value:"The remote host is missing an update for the 'qemu-kvm'
  package(s) announced via the referenced advisory.");
  script_category(ACT_GATHER_INFO);
  script_copyright("Copyright (C) 2012 Greenbone AG");
  script_family("Red Hat Local Security Checks");
  script_dependencies("gather-package-list.nasl");
  script_mandatory_keys("ssh/login/rhel", "ssh/login/rpms", re:"ssh/login/release=RHENT_6");
  script_tag(name:"affected", value:"qemu-kvm on Red Hat Enterprise Linux Desktop (v. 6),
  Red Hat Enterprise Linux Server (v. 6),
  Red Hat Enterprise Linux Workstation (v. 6)");
  script_tag(name:"solution", value:"Please Install the Updated Packages.");
  script_tag(name:"insight", value:"KVM (Kernel-based Virtual Machine) is a full virtualization solution for
  Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component
  for running virtual machines using KVM.

  It was found that qemu-kvm did not properly drop supplemental group
  privileges when the root user started guests from the command line
  ('/usr/libexec/qemu-kvm') with the '-runas' option. A qemu-kvm process
  started this way could use this flaw to gain access to files on the host
  that are accessible to the supplementary groups and not accessible to the
  primary group. (CVE-2011-2527)

  Note: This issue only affected qemu-kvm when it was started directly from
  the command line. It did not affect the Red Hat Enterprise Virtualization
  platform or applications that start qemu-kvm via libvirt, such as the
  Virtual Machine Manager (virt-manager).

  This update also fixes several bugs and adds various enhancements.
  Documentation for these bug fixes and enhancements will be available
  shortly from the Technical Notes document, linked to in the References
  section.

  All users of qemu-kvm are advised to upgrade to these updated packages,
  which contain backported patches to correct these issues and add these
  enhancements. After installing this update, shut down all running virtual
  machines. Once all virtual machines have shut down, start them again for
  this update to take effect.");
  script_tag(name:"qod_type", value:"package");
  script_tag(name:"solution_type", value:"VendorFix");

  exit(0);
}

include("revisions-lib.inc");
include("pkg-lib-rpm.inc");

release = rpm_get_ssh_release();
if(!release) exit(0);

res = "";

if(release == "RHENT_6")
{

  if ((res = isrpmvuln(pkg:"qemu-img", rpm:"qemu-img~0.12.1.2~2.209.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"qemu-kvm", rpm:"qemu-kvm~0.12.1.2~2.209.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"qemu-kvm-debuginfo", rpm:"qemu-kvm-debuginfo~0.12.1.2~2.209.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if ((res = isrpmvuln(pkg:"qemu-kvm-tools", rpm:"qemu-kvm-tools~0.12.1.2~2.209.el6", rls:"RHENT_6")) != NULL)
  {
    security_message(data:res);
    exit(0);
  }

  if (__pkg_match) exit(99);
  exit(0);
}

6.5 Medium

AI Score

Confidence

Low

0.001 Low

EPSS

Percentile

27.6%