SCIENTIFIC-LINUX-ERRATA Archives

December 2016

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Scott Reid <[log in to unmask]>
Reply To:
Date:
Wed, 14 Dec 2016 18:13:23 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (32 lines)
Synopsis:          Moderate: qemu-kvm security, bug fix, and enhancement update
Advisory ID:       SLSA-2016:2585-2
Issue Date:        2016-11-03
CVE Numbers:       CVE-2016-1981
                   CVE-2016-3712
--

Security Fix(es):

* An integer overflow flaw and an out-of-bounds read flaw were found in
the way QEMU's VGA emulator set certain VGA registers while in VBE mode. A
privileged guest user could use this flaw to crash the QEMU process
instance. (CVE-2016-3712)

* An infinite loop flaw was found in the way QEMU's e1000 NIC emulation
implementation processed data using transmit or receive descriptors under
certain conditions. A privileged user inside a guest could use this flaw
to crash the QEMU instance. (CVE-2016-1981)

Additional Changes:
--

SL7
  x86_64
    qemu-img-1.5.3-126.el7.x86_64.rpm
    qemu-kvm-1.5.3-126.el7.x86_64.rpm
    qemu-kvm-common-1.5.3-126.el7.x86_64.rpm
    qemu-kvm-debuginfo-1.5.3-126.el7.x86_64.rpm
    qemu-kvm-tools-1.5.3-126.el7.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2