![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.871073 |
Categoría: | Red Hat Local Security Checks |
Título: | RedHat Update for qemu-kvm RHSA-2013:1553-02 |
Resumen: | The remote host is missing an update for the 'qemu-kvm'; package(s) announced via the referenced advisory. |
Descripción: | Summary: The remote host is missing an update for the 'qemu-kvm' package(s) announced via the referenced advisory. Vulnerability Insight: KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems that is built into the standard Red Hat Enterprise Linux kernel. The qemu-kvm packages form the user-space component for running virtual machines using KVM. A buffer overflow flaw was found in the way QEMU processed the SCSI 'REPORT LUNS' command when more than 256 LUNs were specified for a single SCSI target. A privileged guest user could use this flaw to corrupt QEMU process memory on the host, which could potentially result in arbitrary code execution on the host with the privileges of the QEMU process. (CVE-2013-4344) This issue was discovered by Asias He of Red Hat. These updated qemu-kvm packages include numerous bug fixes and various enhancements. Space precludes documenting all of these changes in this advisory. Users are directed to the Red Hat Enterprise Linux 6.5 Technical Notes, linked to in the References, for information on the most significant of these changes. All qemu-kvm users are advised to upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. 4. Solution: Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at the references. 5. Bugs fixed: 670162 - [RFE] Removing the backing file using qemu-img re-base 796011 - Prompt error of trigger blkdebug: BLKDBG_CLUSTER_FREE event is not the same as expected 817066 - QEMU should disable VNC password auth when in FIPS 140-2 mode 821741 - (re-)enable SEP flag on CPU models 843797 - qemu-kvm core dumps when virtio-net(w/ tx=timer and vhost=on) RHEL.6(w/ msi-x enabled) guest shutting down 848070 - [RHEL 6.5] Add glusterfs support to qemu 856505 - Missing error message in bdrv_commit to read-only backing file 864378 - qemu-img convert fails with Floating Point Exception with zero length source image 869496 - screendump won't save PPM image file if qemu-kvm booted with '-S' 869586 - core dump happens when quitting ... Description truncated, please see the referenced URL(s) for more information. Affected Software/OS: qemu-kvm on Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Workstation (v. 6) Solution: Please Install the Updated Packages. CVSS Score: 7.2 CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-4344 62773 http://www.securityfocus.com/bid/62773 98028 http://osvdb.org/98028 RHSA-2013:1553 http://rhn.redhat.com/errata/RHSA-2013-1553.html RHSA-2013:1754 http://rhn.redhat.com/errata/RHSA-2013-1754.html USN-2092-1 http://www.ubuntu.com/usn/USN-2092-1 [oss-security] 20131002 Xen Security Advisory 65 (CVE-2013-4344) - qemu SCSI REPORT LUNS buffer overflow http://www.openwall.com/lists/oss-security/2013/10/02/2 [qemu-devel] 20131009 [ANNOUNCE] QEMU 1.6.1 Stable released http://article.gmane.org/gmane.comp.emulators.qemu/237191 openSUSE-SU-2014:1279 http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html openSUSE-SU-2014:1281 http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html |
Copyright | Copyright (C) 2013 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |