How to Buy
This script is Copyright (C) 2013-2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated qemu-kvm packages that fix one security issue are now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System
(CVSS) base score, which gives a detailed severity rating, is
available from the CVE link in the References section.
KVM (Kernel-based Virtual Machine) is a full virtualization solution
for Linux on AMD64 and Intel 64 systems. qemu-kvm is the user-space
component for running virtual machines using KVM.
A flaw was found in the way QEMU handled VT100 terminal escape
sequences when emulating certain character devices. A guest user with
privileges to write to a character device that is emulated on the host
using a virtual console back-end could use this flaw to crash the
qemu-kvm process on the host or, possibly, escalate their privileges
on the host. (CVE-2012-3515)
This flaw did not affect the default use of KVM. Affected
configurations were :
* When guests were started from the command line
('/usr/libexec/qemu-kvm') without the '-nodefaults' option, and also
without specifying a serial or parallel device, or a virtio-console
device, that specifically does not use a virtual console (vc)
back-end. (Note that Red Hat does not support invoking 'qemu-kvm' from
the command line without '-nodefaults' on Red Hat Enterprise Linux 6.)
* Guests that were managed via libvirt, such as when using Virtual
Machine Manager (virt-manager), but that have a serial or parallel
device, or a virtio-console device, that uses a virtual console
back-end. By default, guests managed via libvirt will not use a
virtual console back-end for such devices.
Red Hat would like to thank the Xen project for reporting this issue.
All users of qemu-kvm should upgrade to these updated packages, which
resolve this issue. After installing this update, shut down all
running virtual machines. Once all virtual machines have shut down,
start them again for this update to take effect.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.2
CVSS Temporal Score : 5.3
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 64054 ()
Bugtraq ID: 55413
CVE ID: CVE-2012-3515
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.