Scientific Linux Security Update : qemu-kvm on SL7.x x86_64

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

Security Fix(es) :

- An out-of-bounds r/w access issue was found in QEMU's
Cirrus CLGD 54xx VGA Emulator support. The vulnerability
could occur while copying VGA data via various bitblt
functions. A privileged user inside a guest could use
this flaw to crash the QEMU process or, potentially,
execute arbitrary code on the host with privileges of
the QEMU process. (CVE-2017-7980)

- An out-of-bounds access issue was found in QEMU's Cirrus
CLGD 54xx VGA Emulator support. The vulnerability could
occur while copying VGA data using bitblt functions (for
example, cirrus_bitblt_rop_fwd_transp_). A privileged
user inside a guest could use this flaw to crash the
QEMU process, resulting in denial of service.
(CVE-2017-7718)

Bug Fix(es) :

- Previously, guest virtual machines in some cases became
unresponsive when the 'pty' back end of a serial device
performed an irregular I/O communication. This update
improves the handling of serial I/O on guests, which
prevents the described problem from occurring.

See also :

http://www.nessus.org/u?4536c771

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.6
(CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 100779 ()

Bugtraq ID:

CVE ID: CVE-2017-7718
CVE-2017-7980

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now