CentOS Update for kmod-kvm CESA-2014:0163 centos5. KVM (Kernel-based Virtual Machine) update for CentOS 5 addressing divide-by-zero and memory corruption flaws
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | kmod, kvm security update | 12 Feb 201419:33 | β | centos |
![]() | kernel, perf, python security update | 13 Dec 201300:18 | β | centos |
![]() | Red Hat Security Advisory: kvm security update | 15 Sep 202421:13 | β | osv |
![]() | Red Hat Security Advisory: kernel security, bug fix, and enhancement update | 15 Sep 202421:13 | β | osv |
![]() | Red Hat Security Advisory: rhev-hypervisor6 security and bug fix update | 13 Sep 202408:27 | β | osv |
![]() | Red Hat Security Advisory: kernel security and bug fix update | 15 Sep 202421:18 | β | osv |
![]() | Security fix for the ALT Linux 7 package kernel-image-el-def version 2.6.32-alt17 | 9 Jan 201400:00 | β | altlinux |
![]() | Security fix for the ALT Linux 7 package kernel-image-el-def version 2.6.32-alt16 | 20 Dec 201300:00 | β | altlinux |
![]() | Security fix for the ALT Linux 7 package kernel-src-kvm version 3.10.21-alt1 | 20 Dec 201300:00 | β | altlinux |
![]() | (RHSA-2014:0163) Important: kvm security update | 12 Feb 201400:00 | β | redhat |
# SPDX-FileCopyrightText: 2014 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.881880");
script_version("2023-07-11T05:06:07+0000");
script_tag(name:"last_modification", value:"2023-07-11 05:06:07 +0000 (Tue, 11 Jul 2023)");
script_tag(name:"creation_date", value:"2014-02-17 11:38:58 +0530 (Mon, 17 Feb 2014)");
script_cve_id("CVE-2013-6367", "CVE-2013-6368");
script_tag(name:"cvss_base", value:"6.2");
script_tag(name:"cvss_base_vector", value:"AV:L/AC:H/Au:N/C:C/I:C/A:C");
script_name("CentOS Update for kmod-kvm CESA-2014:0163 centos5");
script_tag(name:"affected", value:"kmod-kvm on CentOS 5");
script_tag(name:"insight", value:"KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module built for
the standard Red Hat Enterprise Linux kernel.
A divide-by-zero flaw was found in the apic_get_tmcct() function in KVM's
Local Advanced Programmable Interrupt Controller (LAPIC) implementation.
A privileged guest user could use this flaw to crash the host.
(CVE-2013-6367)
A memory corruption flaw was discovered in the way KVM handled virtual APIC
accesses that crossed a page boundary. A local, unprivileged user could use
this flaw to crash the system or, potentially, escalate their privileges on
the system. (CVE-2013-6368)
Red Hat would like to thank Andrew Honig of Google for reporting these
issues.
All kvm users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues. Note: the procedure in
the Solution section must be performed before this update will take effect.");
script_tag(name:"solution", value:"Please install the updated packages.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"VendorFix");
script_xref(name:"CESA", value:"2014:0163");
script_xref(name:"URL", value:"http://lists.centos.org/pipermail/centos-announce/2014-February/020154.html");
script_tag(name:"summary", value:"The remote host is missing an update for the 'kmod-kvm'
package(s) announced via the referenced advisory.");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2014 Greenbone AG");
script_family("CentOS Local Security Checks");
script_dependencies("gather-package-list.nasl");
script_mandatory_keys("ssh/login/centos", "ssh/login/rpms", re:"ssh/login/release=CentOS5");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
if(release == "CentOS5")
{
if ((res = isrpmvuln(pkg:"kmod-kvm", rpm:"kmod-kvm~83~266.el5.centos.1", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kmod-kvm-debug", rpm:"kmod-kvm-debug~83~266.el5.centos.1", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kvm", rpm:"kvm~83~266.el5.centos.1", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kvm-qemu-img", rpm:"kvm-qemu-img~83~266.el5.centos.1", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if ((res = isrpmvuln(pkg:"kvm-tools", rpm:"kvm-tools~83~266.el5.centos.1", rls:"CentOS5")) != NULL)
{
security_message(data:res);
exit(0);
}
if (__pkg_match) exit(99);
exit(0);
}
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo