Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.70478
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2011:1531
Summary:NOSUMMARY
Description:Description:
The remote host is missing updates announced in
advisory RHSA-2011:1531.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component
for running virtual machines using KVM.

It was found that qemu-kvm did not properly drop supplemental group
privileges when the root user started guests from the command line
(/usr/libexec/qemu-kvm) with the -runas option. A qemu-kvm process
started this way could use this flaw to gain access to files on the host
that are accessible to the supplementary groups and not accessible to the
primary group. (CVE-2011-2527)

Note: This issue only affected qemu-kvm when it was started directly from
the command line. It did not affect the Red Hat Enterprise Virtualization
platform or applications that start qemu-kvm via libvirt, such as the
Virtual Machine Manager (virt-manager).

This update also fixes several bugs and adds various enhancements.
Documentation for these bug fixes and enhancements will be available
shortly from the Technical Notes document, linked to in the References
section.

All users of qemu-kvm are advised to upgrade to these updated packages,
which contain backported patches to correct these issues and add these
enhancements. After installing this update, shut down all running virtual
machines. Once all virtual machines have shut down, start them again for
this update to take effect.

Solution:
Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

http://rhn.redhat.com/errata/RHSA-2011-1531.html

Risk factor : Medium

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-2527
45187
http://secunia.com/advisories/45187
45188
http://secunia.com/advisories/45188
45419
http://secunia.com/advisories/45419
47157
http://secunia.com/advisories/47157
47992
http://secunia.com/advisories/47992
48659
http://www.securityfocus.com/bid/48659
74752
http://www.osvdb.org/74752
DSA-2282
https://www.debian.org/security/2011/dsa-2282
FEDORA-2012-8604
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html
RHSA-2011:1531
http://rhn.redhat.com/errata/RHSA-2011-1531.html
USN-1177-1
http://ubuntu.com/usn/usn-1177-1
[oss-security] 20110712 CVE Request: qemu -runas does not clear supplementary groups
http://www.openwall.com/lists/oss-security/2011/07/12/5
[oss-security] 20110712 Re: CVE Request: qemu -runas does not clear supplementary groups
http://www.openwall.com/lists/oss-security/2011/07/12/15
https://bugs.launchpad.net/qemu/+bug/807893
openSUSE-SU-2012:0207
http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html
qemu-runas-priv-escalation(68539)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68539
CopyrightCopyright (c) 2012 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.