Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.870724
Category:Red Hat Local Security Checks
Title:RedHat Update for qemu-kvm RHSA-2011:1531-03
Summary:The remote host is missing an update for the 'qemu-kvm'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'qemu-kvm'
package(s) announced via the referenced advisory.

Vulnerability Insight:
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space component
for running virtual machines using KVM.

It was found that qemu-kvm did not properly drop supplemental group
privileges when the root user started guests from the command line
('/usr/libexec/qemu-kvm') with the '-runas' option. A qemu-kvm process
started this way could use this flaw to gain access to files on the host
that are accessible to the supplementary groups and not accessible to the
primary group. (CVE-2011-2527)

Note: This issue only affected qemu-kvm when it was started directly from
the command line. It did not affect the Red Hat Enterprise Virtualization
platform or applications that start qemu-kvm via libvirt, such as the
Virtual Machine Manager (virt-manager).

This update also fixes several bugs and adds various enhancements.
Documentation for these bug fixes and enhancements will be available
shortly from the Technical Notes document, linked to in the References
section.

All users of qemu-kvm are advised to upgrade to these updated packages,
which contain backported patches to correct these issues and add these
enhancements. After installing this update, shut down all running virtual
machines. Once all virtual machines have shut down, start them again for
this update to take effect.

Affected Software/OS:
qemu-kvm on Red Hat Enterprise Linux Desktop (v. 6),
Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)

Solution:
Please Install the Updated Packages.

CVSS Score:
2.1

CVSS Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2011-2527
BugTraq ID: 48659
http://www.securityfocus.com/bid/48659
Debian Security Information: DSA-2282 (Google Search)
https://www.debian.org/security/2011/dsa-2282
http://lists.fedoraproject.org/pipermail/package-announce/2012-June/081972.html
http://www.openwall.com/lists/oss-security/2011/07/12/5
http://www.openwall.com/lists/oss-security/2011/07/12/15
http://www.osvdb.org/74752
RedHat Security Advisories: RHSA-2011:1531
http://rhn.redhat.com/errata/RHSA-2011-1531.html
http://secunia.com/advisories/45187
http://secunia.com/advisories/45188
http://secunia.com/advisories/45419
http://secunia.com/advisories/47157
http://secunia.com/advisories/47992
SuSE Security Announcement: openSUSE-SU-2012:0207 (Google Search)
http://lists.opensuse.org/opensuse-updates/2012-02/msg00009.html
http://ubuntu.com/usn/usn-1177-1
XForce ISS Database: qemu-runas-priv-escalation(68539)
https://exchange.xforce.ibmcloud.com/vulnerabilities/68539
CopyrightCopyright (c) 2012 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2021 E-Soft Inc. All rights reserved.