RHEL 7 : qemu-kvm-rhev (RHSA-2017:2392)

This script is Copyright (C) 2017 Tenable Network Security, Inc.


Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

An update for qemu-kvm-rhev is now available for RHEV 4.X RHEV-H and
Agents for RHEL 7.

Red Hat Product Security has rated this update as having a security
impact of Important. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution
for Linux on a variety of architectures. The qemu-kvm-rhev packages
provide the user-space component for running virtual machines that use
KVM in environments managed by Red Hat products.

The following packages have been upgraded to a later upstream version:
qemu-kvm-rhev (2.9.0). (BZ#1387372, BZ#1387600, BZ#1400962)

Security Fix(es) :

* A stack-based buffer overflow flaw was found in the Quick Emulator
(QEMU) built with the Network Block Device (NBD) client support. The
flaw could occur while processing server's response to a
'NBD_OPT_LIST' request. A malicious NBD server could use this issue to
crash a remote NBD client resulting in DoS or potentially execute
arbitrary code on client host with privileges of the QEMU process.
(CVE-2017-2630)

* An integer overflow flaw was found in Quick Emulator (QEMU) in the
CCID Card device support. The flaw could occur while passing messages
via command/response packets to and from the host. A privileged user
inside a guest could use this flaw to crash the QEMU process.
(CVE-2017-5898)

* An information exposure flaw was found in Quick Emulator (QEMU) in
Task Priority Register (TPR) optimizations for 32-bit Windows guests.
The flaw could occur while accessing TPR. A privileged user inside a
guest could use this issue to read portions of the host memory.
(CVE-2016-4020)

* A memory-leak flaw was found in the Quick Emulator(QEMU) built with
USB xHCI controller emulation support. The flaw could occur while
doing a USB-device unplug operation. Unplugging the device repeatedly
resulted in leaking host memory, affecting other services on the host.
A privileged user inside the guest could exploit this flaw to cause a
denial of service on the host or potentially crash the host's QEMU
process instance. (CVE-2016-7466)

* Multiple CVEs(CVE-2016-10155, CVE-2016-4020, CVE-2016-6835,
CVE-2016-6888, CVE-2016-7422, CVE-2016-7466, CVE-2016-8576,
CVE-2016-8669, CVE-2016-8909, CVE-2016-8910, CVE-2016-9907,
CVE-2016-9911, CVE-2016-9921, CVE-2016-9922, CVE-2017-2630,
CVE-2017-5579, CVE-2017-5898, CVE-2017-5973, CVE-2017-9310,
CVE-2017-9373, CVE-2017-9374, CVE-2017-9375) were fixed as result of
rebase to QEMU version 2.9.0.

Red Hat would like to thank Li Qiang (Qihoo 360 Inc.) for reporting
CVE-2016-6835 and CVE-2016-6888; Li Qiang (360.cn Inc.) for reporting
CVE-2017-5898, CVE-2016-7466, CVE-2016-10155, CVE-2017-5579, and
CVE-2017-5973; Donghai Zdh (Alibaba Inc.) for reporting CVE-2016-4020;
Qinghao Tang (Marvel Team 360.cn Inc.) and Zhenhao Hong (Marvel Team
360.cn Inc.) for reporting CVE-2016-7422; PSIRT (Huawei Inc.) for
reporting CVE-2016-8669; Andrew Henderson (Intelligent Automation
Inc.) for reporting CVE-2016-8910; Qinghao Tang (Qihoo 360), Li Qiang
(Qihoo 360), and Jiangxin (Huawei Inc.) for reporting CVE-2016-9921
and CVE-2016-9922; and Li Qiang (Qihoo 360 Gear Team) for reporting
CVE-2017-9310, CVE-2017-9373, CVE-2017-9374, and CVE-2017-9375.

Additional Changes :

This update also fixes several bugs and adds various enhancements.
Documentation for these changes is available from the Release Notes
document linked to in the References section.

See also :

http://rhn.redhat.com/errata/RHSA-2017-2392.html
https://www.redhat.com/security/data/cve/CVE-2016-10155.html
https://www.redhat.com/security/data/cve/CVE-2016-4020.html
https://www.redhat.com/security/data/cve/CVE-2016-6835.html
https://www.redhat.com/security/data/cve/CVE-2016-6888.html
https://www.redhat.com/security/data/cve/CVE-2016-7422.html
https://www.redhat.com/security/data/cve/CVE-2016-7466.html
https://www.redhat.com/security/data/cve/CVE-2016-8576.html
https://www.redhat.com/security/data/cve/CVE-2016-8669.html
https://www.redhat.com/security/data/cve/CVE-2016-8909.html
https://www.redhat.com/security/data/cve/CVE-2016-8910.html
https://www.redhat.com/security/data/cve/CVE-2016-9907.html
https://www.redhat.com/security/data/cve/CVE-2016-9911.html
https://www.redhat.com/security/data/cve/CVE-2016-9921.html
https://www.redhat.com/security/data/cve/CVE-2016-9922.html
https://www.redhat.com/security/data/cve/CVE-2017-2630.html
https://www.redhat.com/security/data/cve/CVE-2017-5579.html
https://www.redhat.com/security/data/cve/CVE-2017-5898.html
https://www.redhat.com/security/data/cve/CVE-2017-5973.html
https://www.redhat.com/security/data/cve/CVE-2017-9310.html
https://www.redhat.com/security/data/cve/CVE-2017-9373.html
https://www.redhat.com/security/data/cve/CVE-2017-9374.html
https://www.redhat.com/security/data/cve/CVE-2017-9375.html

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.9
(CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 3.6
(CVSS2#E:U/RL:OF/RC:C)
Public Exploit Available : false