OracleVM 3.4 : qemu-kvm (OVMSA-2018-0238) (Spectre)

critical Nessus Plugin ID 111023

Synopsis

The remote OracleVM host is missing a security update.

Description

The remote OracleVM system is missing necessary patches to address critical security updates :

- qemu-kvm-i386-define-the-ssbd-CPUID-feature-bit-CVE-2018
-3639.patch

- qemu-kvm-i386-Define-the-Virt-SSBD-MSR-and-handling-of-i t-CVE.patch

- qemu-kvm-i386-define-the-AMD-virt-ssbd-CPUID-feature-bit
-CVE-.patch

- Resolves: bz#1574074 (CVE-2018-3639 qemu-kvm: hw: cpu:
speculative store bypass [rhel-6.10.z])

- kvm-vga-add-share_surface-flag.patch [bz#1553674]

- kvm-vga-add-sanity-checks.patch [bz#1553674]

- Resolves: bz#1553674 (CVE-2018-7858 qemu-kvm: Qemu:
cirrus: OOB access when updating vga display [rhel-6])

- kvm-target-i386-add-support-for-SPEC_CTRL-MSR.patch [bz#1525939 bz#1528024]

- kvm-target-i386-cpu-add-new-CPUID-bits-for-indirect-bran .patch

- kvm-target-i386-cpu-add-new-CPU-models-for-indirect-bran .patch

- kvm-cirrus-fix-oob-access-in-mode4and5-write-functions.p atch [bz#1501298]

- kvm-vga-stop-passing-pointers-to-vga_draw_line-functions .patch

- kvm-vga-check-the-validation-of-memory-addr-when-draw-te .patch

- Resolves: bz#1486641 (CVE-2017-13672 qemu-kvm-rhev:
Qemu: vga: OOB read access during display update [rhel-6.10])

- Resolves: bz#1501298 (CVE-2017-15289 qemu-kvm: Qemu:
cirrus: OOB access issue in mode4and5 write functions [rhel-6.10])

- Resolves: bz#1525939 (CVE-2017-5715 qemu-kvm: hw: cpu:
speculative execution branch target injection [rhel-6.10])

- Resolves: bz#1528024 (CVE-2017-5715 qemu-kvm-rhev: hw:
cpu: speculative execution branch target injection [rhel-6.10])

- Resolves: bz#1534692 (CVE-2018-5683 qemu-kvm: Qemu:
Out-of-bounds read in vga_draw_text routine [rhel-6.10])

- Resolves: bz#1549152 (qemu-kvm-rhev: remove unused patch file [rhel-6.10])

- kvm-vns-tls-don-t-use-depricated-gnutls-functions.patch [bz#1428750]

- kvm-vnc-apply-display-size-limits.patch [bz#1430616 bz#1430617]

- kvm-fix-cirrus_vga-fix-OOB-read-case-qemu-Segmentation-f .patch

- kvm-cirrus-vnc-zap-bitblit-support-from-console-code.pat ch [bz#1443448 bz#1443450 bz#1447542 bz#1447545]

- kvm-cirrus-avoid-write-only-variables.patch [bz#1444378 bz#1444380]

- kvm-cirrus-stop-passing-around-dst-pointers-in-the-blitt .patch

- kvm-cirrus-stop-passing-around-src-pointers-in-the-blitt .patch

- kvm-cirrus-fix-off-by-one-in-cirrus_bitblt_rop_bkwd_tran .patch

- kvm-cirrus-fix-PUTPIXEL-macro.patch [bz#1444378 bz#1444380]

- Resolves: bz#1428750 (Fails to build in brew)

- Resolves: bz#1430616 (CVE-2017-2633 qemu-kvm: Qemu: VNC:
memory corruption due to unchecked resolution limit [rhel-6.10])

- Resolves: bz#1430617 (CVE-2017-2633 qemu-kvm-rhev: Qemu:
VNC: memory corruption due to unchecked resolution limit [rhel-6.10])

- Resolves: bz#1443448 (CVE-2017-7718 qemu-kvm: Qemu:
display: cirrus: OOB read access issue [rhel-6.10])

- Resolves: bz#1443450 (CVE-2017-7718 qemu-kvm-rhev: Qemu:
display: cirrus: OOB read access issue [rhel-6.10])

- Resolves: bz#1444378 (CVE-2017-7980 qemu-kvm: Qemu:
display: cirrus: OOB r/w access issues in bitblt routines [rhel-6.10])

- Resolves: bz#1444380 (CVE-2017-7980 qemu-kvm-rhev: Qemu:
display: cirrus: OOB r/w access issues in bitblt routines [rhel-6.10])

- Resolves: bz#1447542 (CVE-2016-9603 qemu-kvm: Qemu:
cirrus: heap buffer overflow via vnc connection [rhel-6.10])

- Resolves: bz#1447545 (CVE-2016-9603 qemu-kvm-rhev: Qemu:
cirrus: heap buffer overflow via vnc connection [rhel-6.10])

Solution

Update the affected qemu-img package.

See Also

https://oss.oracle.com/pipermail/oraclevm-errata/2018-July/000873.html

Plugin Details

Severity: Critical

ID: 111023

File Name: oraclevm_OVMSA-2018-0238.nasl

Version: 1.8

Type: local

Published: 7/12/2018

Updated: 9/27/2019

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.6

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.9

Temporal Score: 9.5

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:vm:qemu-img, cpe:/o:oracle:vm_server:3.4

Required KB Items: Host/local_checks_enabled, Host/OracleVM/release, Host/OracleVM/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/11/2018

Vulnerability Publication Date: 4/20/2017

Reference Information

CVE: CVE-2016-9603, CVE-2017-13672, CVE-2017-15289, CVE-2017-2633, CVE-2017-5715, CVE-2017-7718, CVE-2017-7980, CVE-2018-3639, CVE-2018-5683, CVE-2018-7858