This script is Copyright (C) 2016-2017 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
An update for qemu-kvm is now available for Red Hat Enterprise Linux
Red Hat Product Security has rated this update as having a security
impact of Moderate. A Common Vulnerability Scoring System (CVSS) base
score, which gives a detailed severity rating, is available for each
vulnerability from the CVE link(s) in the References section.
Kernel-based Virtual Machine (KVM) is a full virtualization solution
for Linux on AMD64 and Intel 64 systems. The qemu-kvm packages provide
the user-space component for running virtual machines using KVM.
Security Fix(es) :
* An integer overflow flaw and an out-of-bounds read flaw were found
in the way QEMU's VGA emulator set certain VGA registers while in VBE
mode. A privileged guest user could use this flaw to crash the QEMU
process instance. (CVE-2016-3712)
* An infinite loop flaw was found in the way QEMU's e1000 NIC
emulation implementation processed data using transmit or receive
descriptors under certain conditions. A privileged user inside a guest
could use this flaw to crash the QEMU instance. (CVE-2016-1981)
Red Hat would like to thank Zuozhi Fzz (Alibaba Inc.) for reporting
Additional Changes :
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 7.3 Release Notes linked from the References section.
See also :
Update the affected packages.
Risk factor :
Low / CVSS Base Score : 2.1
CVSS Temporal Score : 1.6
Public Exploit Available : false