Description: | Summary: The remote host is missing an update for the 'qemu-kvm' package(s) announced via the referenced advisory.
Vulnerability Insight: Kernel-based Virtual Machine (KVM) is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-space component for running virtual machines using KVM.
Security Fix(es):
* An integer overflow flaw and an out-of-bounds read flaw were found in the way QEMU's VGA emulator set certain VGA registers while in VBE mode. A privileged guest user could use this flaw to crash the QEMU process instance. (CVE-2016-3712)
* An infinite loop flaw was found in the way QEMU's e1000 NIC emulation implementation processed data using transmit or receive descriptors under certain conditions. A privileged user inside a guest could use this flaw to crash the QEMU instance. (CVE-2016-1981)
Red Hat would like to thank Zuozhi Fzz (Alibaba Inc.) for reporting CVE-2016-3712.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.
Affected Software/OS: qemu-kvm on Red Hat Enterprise Linux Server (v. 7)
Solution: Please Install the Updated Packages.
CVSS Score: 2.1
CVSS Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P
|