Scientific Linux Security Update : qemu-kvm on SL7.x x86_64

High Nessus Plugin ID 97517

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

Security Fix(es) :

- Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host.
(CVE-2017-2615)

- Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. (CVE-2017-2620)

Bug Fix(es) :

- When using the virtio-blk driver on a guest virtual machine with no space on the virtual hard drive, the guest terminated unexpectedly with a 'block I/O error in device' message and the qemu-kvm process exited with a segmentation fault. This update fixes how the system_reset QEMU signal is handled in the above scenario. As a result, if a guest crashes due to no space left on the device, qemu-kvm continues running and the guest can be reset as expected.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?59a8a749

Plugin Details

Severity: High

ID: 97517

File Name: sl_20170302_qemu_kvm_on_SL7_x.nasl

Version: 3.7

Type: local

Agent: unix

Published: 2017/03/03

Updated: 2018/12/27

Dependencies: 12634

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS v3.0

Base Score: 9.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2017/03/02

Reference Information

CVE: CVE-2017-2615, CVE-2017-2620

IAVB: 2017-B-0024