SCIENTIFIC-LINUX-ERRATA Archives

August 2016

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Kevin Hill <[log in to unmask]>
Reply To:
Date:
Tue, 16 Aug 2016 20:56:11 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (40 lines)
Synopsis:          Moderate: qemu-kvm security update
Advisory ID:       SLSA-2016:1606-1
Issue Date:        2016-08-11
CVE Numbers:       CVE-2016-5403
                   CVE-2016-5126
--

Security Fix(es):

* Quick Emulator(Qemu) built with the Block driver for iSCSI images
support (virtio-blk) is vulnerable to a heap buffer overflow issue. It
could occur while processing iSCSI asynchronous I/O ioctl(2) calls. A user
inside guest could use this flaw to crash the Qemu process resulting in
DoS or potentially leverage it to execute arbitrary code with privileges
of the Qemu process on the host. (CVE-2016-5126)

* Quick emulator(Qemu) built with the virtio framework is vulnerable to an
unbounded memory allocation issue. It was found that a malicious guest
user could submit more requests than the virtqueue size permits.
Processing a request allocates a VirtQueueElement and therefore causes
unbounded memory allocation on the host controlled by the guest.
(CVE-2016-5403)
--

SL7
  x86_64
    libcacard-1.5.3-105.el7_2.7.i686.rpm
    libcacard-1.5.3-105.el7_2.7.x86_64.rpm
    qemu-img-1.5.3-105.el7_2.7.x86_64.rpm
    qemu-kvm-1.5.3-105.el7_2.7.x86_64.rpm
    qemu-kvm-common-1.5.3-105.el7_2.7.x86_64.rpm
    qemu-kvm-debuginfo-1.5.3-105.el7_2.7.i686.rpm
    qemu-kvm-debuginfo-1.5.3-105.el7_2.7.x86_64.rpm
    qemu-kvm-tools-1.5.3-105.el7_2.7.x86_64.rpm
    libcacard-devel-1.5.3-105.el7_2.7.i686.rpm
    libcacard-devel-1.5.3-105.el7_2.7.x86_64.rpm
    libcacard-tools-1.5.3-105.el7_2.7.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2