This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated kvm packages that fix one security issue and several bugs are
now available for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
moderate security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from
the CVE link in the References section.
KVM (Kernel-based Virtual Machine) is a full virtualization solution
for Linux on AMD64 and Intel 64 systems. KVM is a Linux kernel module
built for the standard Red Hat Enterprise Linux kernel.
It was found that the kvm_vm_ioctl_assign_device() function in the KVM
subsystem of a Linux kernel did not check if the user requesting
device assignment was privileged or not. A member of the kvm group on
the host could assign unused PCI devices, or even devices that were in
use and whose resources were not properly claimed by the respective
drivers, which could result in the host crashing. (CVE-2011-4347)
Red Hat would like to thank Sasha Levin for reporting this issue.
These updated kvm packages include several bug fixes. Space precludes
documenting all of these changes in this advisory. Users are directed
to the Red Hat Enterprise Linux 5.8 Technical Notes, linked to in the
References, for information on the most significant of these changes.
All KVM users should upgrade to these updated packages, which contain
backported patches to correct these issues. Note: The procedure in the
Solution section must be performed before this update will take
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.0
CVSS Temporal Score : 3.5
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 64028 ()
Bugtraq ID: 50811
CVE ID: CVE-2011-4347
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.