How to Buy
This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated qemu-kvm packages that fix two security issues, several bugs,
and add various enhancements are now available for Red Hat Enterprise
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.
KVM (Kernel-based Virtual Machine) is a full virtualization solution
for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space
component for running virtual machines using KVM.
It was found that the virtio-blk driver in qemu-kvm did not properly
validate read and write requests from guests. A privileged guest user
could use this flaw to crash the guest or, possibly, execute arbitrary
code on the host. (CVE-2011-1750)
It was found that the PIIX4 Power Management emulation layer in
qemu-kvm did not properly check for hot plug eligibility during device
removals. A privileged guest user could use this flaw to crash the
guest or, possibly, execute arbitrary code on the host.
Red Hat would like to thank Nelson Elhage for reporting CVE-2011-1751.
This update also fixes several bugs and adds various enhancements.
Documentation for these bug fixes and enhancements will be available
shortly from the Technical Notes document, linked to in the References
All users of qemu-kvm should upgrade to these updated packages, which
contain backported patches to resolve these issues, and fix the bugs
and add the enhancements noted in the Technical Notes. After
installing this update, shut down all running virtual machines. Once
all virtual machines have shut down, start them again for this update
to take effect.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.4
Family: Red Hat Local Security Checks
Nessus Plugin ID: 63980 ()
CVE ID: CVE-2011-1750CVE-2011-1751
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.