SCIENTIFIC-LINUX-ERRATA Archives

October 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Condense Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Content-Type:
text/plain; charset="utf-8"
Date:
Thu, 22 Oct 2015 19:58:28 +0000
Reply-To:
Subject:
MIME-Version:
1.0
Message-ID:
Content-Transfer-Encoding:
7bit
Sender:
Security Errata for Scientific Linux <[log in to unmask]>
From:
Pat Riehecky <[log in to unmask]>
Parts/Attachments:
text/plain (30 lines)
Synopsis:          Important: qemu-kvm security update
Advisory ID:       SLSA-2015:1924-1
Issue Date:        2015-10-22
CVE Numbers:       CVE-2015-5279
--

A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC
emulation implementation handled certain packets received over the
network. A privileged user inside a guest could use this flaw to crash the
QEMU instance (denial of service) or potentially execute arbitrary code on
the host. (CVE-2015-5279)

After installing this update, shut down all running virtual machines. Once
all virtual machines have shut down, start them again for this update to
take effect.
--

SL6
  x86_64
    qemu-guest-agent-0.12.1.2-2.479.el6_7.2.x86_64.rpm
    qemu-img-0.12.1.2-2.479.el6_7.2.x86_64.rpm
    qemu-kvm-0.12.1.2-2.479.el6_7.2.x86_64.rpm
    qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.2.x86_64.rpm
    qemu-kvm-tools-0.12.1.2-2.479.el6_7.2.x86_64.rpm
  i386
    qemu-guest-agent-0.12.1.2-2.479.el6_7.2.i686.rpm
    qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.2.i686.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2