EulerOS 2.0 SP8 : qemu (EulerOS-SA-2019-2300)

medium Nessus Plugin ID 131366

Synopsis

The remote EulerOS host is missing multiple security updates.

Description

According to the versions of the qemu packages installed, the EulerOS installation on the remote host is affected by the following vulnerabilities :

- Microarchitectural Store Buffer Data Sampling (MSBDS):
Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12126)

- Microarchitectural Load Port Data Sampling (MLPDS):
Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12127)

- Microarchitectural Fill Buffer Data Sampling (MFBDS):
Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2018-12130)

- Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
https://www.intel.com/content/dam/www/public/us/en/docu ments/corporate-information/SA00233-microcode-update-gu idance_05132019.pdf(CVE-2019-11091)

Note that Tenable Network Security has extracted the preceding description block directly from the EulerOS security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.

Solution

Update the affected qemu packages.

See Also

http://www.nessus.org/u?c527722b

Plugin Details

Severity: Medium

ID: 131366

File Name: EulerOS_SA-2019-2300.nasl

Version: 1.7

Type: local

Published: 11/27/2019

Updated: 5/27/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 3.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2019-11091

CVSS v3

Risk Factor: Medium

Base Score: 5.6

Temporal Score: 5.1

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:huawei:euleros:qemu-ui-gtk, p-cpe:/a:huawei:euleros:qemu-ui-curses, p-cpe:/a:huawei:euleros:qemu-kvm, p-cpe:/a:huawei:euleros:qemu-audio-oss, p-cpe:/a:huawei:euleros:qemu-system-aarch64-core, p-cpe:/a:huawei:euleros:qemu-img, p-cpe:/a:huawei:euleros:qemu-common, p-cpe:/a:huawei:euleros:qemu-audio-pa, p-cpe:/a:huawei:euleros:qemu-block-curl, p-cpe:/a:huawei:euleros:qemu-system-aarch64, p-cpe:/a:huawei:euleros:qemu-audio-alsa, p-cpe:/a:huawei:euleros:qemu-audio-sdl, p-cpe:/a:huawei:euleros:qemu-block-iscsi, p-cpe:/a:huawei:euleros:qemu-ui-sdl, p-cpe:/a:huawei:euleros:qemu-block-dmg, p-cpe:/a:huawei:euleros:qemu-block-gluster, p-cpe:/a:huawei:euleros:qemu-block-rbd, p-cpe:/a:huawei:euleros:qemu-block-ssh, p-cpe:/a:huawei:euleros:qemu-block-nfs, cpe:/o:huawei:euleros:2.0

Required KB Items: Host/local_checks_enabled, Host/EulerOS/release, Host/EulerOS/rpm-list, Host/EulerOS/sp

Excluded KB Items: Host/EulerOS/uvp_version

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 11/27/2019

Reference Information

CVE: CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091