New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 8.4
Synopsis
The remote OracleVM host is missing a security update.
Description
The remote OracleVM system is missing necessary patches to address critical security updates :
- kvm-slirp-fix-big-little-endian-conversion-in-ident-prot .patch
- kvm-slirp-ensure-there-is-enough-space-in-mbuf-to-null-t .patch
- kvm-slirp-don-t-manipulate-so_rcv-in-tcp_emu.patch [bz#1669066]
- kvm-qxl-check-release-info-object.patch [bz#1712728]
- kvm-net-Use-iov-helper-functions.patch [bz#1636415]
- kvm-net-increase-buffer-size-to-accommodate-Jumbo-frame- .patch
- kvm-net-ignore-packet-size-greater-than-INT_MAX.patch [bz#1636415]
- kvm-net-drop-too-large-packet-early.patch [bz#1636415]
- kvm-PATCH-slirp-fix-buffer-overrun.patch [bz#1586251]
- kvm-Fix-build-from-previous-commit.patch [bz#1586251]
- kvm-slirp-remove-mbuf-m_hdr-m_dat-indirection.patch [bz#1586251]
- kvm-slirp-Convert-mbufs-to-use-g_malloc-and-g_free.patch [bz#1586251]
- kvm-slirp-correct-size-computation-while-concatenating-m .patch
- kvm-pcnet-fix-possible-buffer-overflow.patch [bz#1636774]
- Resolves: bz#1586251 (CVE-2018-11806 qemu-kvm: QEMU:
slirp: heap buffer overflow while reassembling fragmented datagrams [rhel-6.10.z])
- Resolves: bz#1636415 (CVE-2018-10839 qemu-kvm: Qemu:
ne2000: integer overflow leads to buffer overflow issue [rhel-6])
- Resolves: bz#1636774 (CVE-2018-17962 qemu-kvm: Qemu:
pcnet: integer overflow leads to buffer overflow [rhel-6])
- Resolves: bz#1669066 (CVE-2019-6778 qemu-kvm: QEMU:
slirp: heap buffer overflow in tcp_emu [rhel-6.10.z])
- Resolves: bz#1712728 (CVE-2019-12155 qemu-kvm: QEMU:
qxl: null pointer dereference while releasing spice resources [rhel-6])
Solution
Update the affected qemu-img package.