SCIENTIFIC-LINUX-ERRATA Archives

January 2017

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Scott Reid <[log in to unmask]>
Reply To:
Date:
Tue, 17 Jan 2017 21:12:57 -0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (34 lines)
Synopsis:          Low: qemu-kvm security and bug fix update
Advisory ID:       SLSA-2017:0083-1
Issue Date:        2017-01-17
CVE Numbers:       CVE-2016-2857
--

Security Fix(es):

* An out-of-bounds read-access flaw was found in the QEMU emulator built
with IP checksum routines. The flaw could occur when computing a TCP/UDP
packet's checksum, because a QEMU function used the packet's payload
length without checking against the data buffer's size. A user inside a
guest could use this flaw to crash the QEMU process (denial of service).
(CVE-2016-2857)

Bug Fix(es):

* Previously, rebooting a guest virtual machine more than 128 times in a
short period of time caused the guest to shut down instead of rebooting,
because the virtqueue was not cleaned properly. This update ensures that
the virtqueue is cleaned more reliably, which prevents the described
problem from occurring.
--

SL7
  x86_64
    qemu-img-1.5.3-126.el7_3.3.x86_64.rpm
    qemu-kvm-1.5.3-126.el7_3.3.x86_64.rpm
    qemu-kvm-common-1.5.3-126.el7_3.3.x86_64.rpm
    qemu-kvm-debuginfo-1.5.3-126.el7_3.3.x86_64.rpm
    qemu-kvm-tools-1.5.3-126.el7_3.3.x86_64.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2