Oracle Linux 5 : kvm (ELSA-2015-1925)

High Nessus Plugin ID 86557


The remote Oracle Linux host is missing one or more security updates.


From Red Hat Security Advisory 2015:1925 :

Updated kvm packages that fix one security issue are now available for Red Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

KVM (Kernel-based Virtual Machine) is a full virtualization solution for Linux on AMD64 and Intel 64 systems.

A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host. (CVE-2015-5279)

Red Hat would like to thank Qinghao Tang of QIHU 360 Inc. for reporting this issue.

All kvm users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. Note: The procedure in the Solution section must be performed before this update will take effect.


Update the affected kvm packages.

See Also

Plugin Details

Severity: High

ID: 86557

File Name: oraclelinux_ELSA-2015-1925.nasl

Version: $Revision: 2.4 $

Type: local

Agent: unix

Published: 2015/10/23

Modified: 2016/04/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6.1

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:kmod-kvm, p-cpe:/a:oracle:linux:kmod-kvm-debug, p-cpe:/a:oracle:linux:kvm, p-cpe:/a:oracle:linux:kvm-qemu-img, p-cpe:/a:oracle:linux:kvm-tools, cpe:/o:oracle:linux:5

Required KB Items: Host/local_checks_enabled, Host/OracleLinux, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2015/10/22

Reference Information

CVE: CVE-2015-5279

OSVDB: 127494

RHSA: 2015:1925