This script is Copyright (C) 2017 Tenable Network Security, Inc.
The remote Oracle Linux host is missing one or more security updates.
From Red Hat Security Advisory 2017:1856 :
An update for qemu-kvm is now available for Red Hat Enterprise Linux
Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Kernel-based Virtual Machine (KVM) is a full virtualization solution
for Linux on a variety of architectures. The qemu-kvm package provides
the user-space component for running virtual machines that use KVM.
Security Fix(es) :
* An out-of-bounds memory access issue was found in Quick Emulator
(QEMU) in the VNC display driver. This flaw could occur while
refreshing the VNC display surface area in the
'vnc_refresh_server_surface'. A user inside a guest could use this
flaw to crash the QEMU process. (CVE-2017-2633)
* An integer overflow flaw was found in Quick Emulator (QEMU) in the
CCID Card device support. The flaw could occur while passing messages
via command/response packets to and from the host. A privileged user
inside a guest could use this flaw to crash the QEMU process.
* An information exposure flaw was found in Quick Emulator (QEMU) in
Task Priority Register (TPR) optimizations for 32-bit Windows guests.
The flaw could occur while accessing TPR. A privileged user inside a
guest could use this issue to read portions of the host memory.
Red Hat would like to thank Li Qiang (360.cn Inc.) for reporting
CVE-2017-5898 and Donghai Zdh (Alibaba Inc.) for reporting
Additional Changes :
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.4 Release Notes linked from the References section.
See also :
Update the affected qemu-kvm packages.
Risk factor :
Low / CVSS Base Score : 2.1
CVSS Temporal Score : 1.6
Public Exploit Available : false