SCIENTIFIC-LINUX-ERRATA Archives

June 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Connie Sieh <[log in to unmask]>
Reply To:
Date:
Fri, 26 Jun 2015 21:17:31 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (35 lines)
Synopsis:          Important: kvm security update
Advisory ID: SLSA-2015:1189-1
Issue Date: 2015-06-25
CVE Numbers: CVE-2015-3209
--

A flaw was found in the way QEMU's AMD PCnet Ethernet emulation handled
multi-TMD packets with a length above 4096 bytes. A privileged guest user
in a guest with an AMD PCNet ethernet card enabled could potentially use
this flaw to execute arbitrary code on the host with the privileges of the
hosting QEMU process. (CVE-2015-3209)

KVM must be "restarted" before this update will take effect.

  Shutdown all KVM virtual machines.

  Either reboot or unload and reload the following kernel modules : kvm, ksm, kvm-intel or kvm-amd.

  Start the KVM virtual machines.



--

SL5
  x86_64
    kmod-kvm-83-273.el5_11.x86_64.rpm
    kmod-kvm-debug-83-273.el5_11.x86_64.rpm
    kvm-83-273.el5_11.x86_64.rpm
    kvm-debuginfo-83-273.el5_11.x86_64.rpm
    kvm-qemu-img-83-273.el5_11.x86_64.rpm
    kvm-tools-83-273.el5_11.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2