Print

Print


Synopsis:          Important: kvm security update
Advisory ID:       SLSA-2015:1925-1
Issue Date:        2015-10-22
CVE Numbers:       CVE-2015-5279
--

A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC
emulation implementation handled certain packets received over the
network. A privileged user inside a guest could use this flaw to crash the
QEMU instance (denial of service) or potentially execute arbitrary code on
the host. (CVE-2015-5279)

NOTE: The following procedure must be performed before this update will take
effect:

1) Stop all KVM guest virtual machines.

2) Either reboot the hypervisor machine or, as the root user, remove (using
"modprobe -r [module]") and reload (using "modprobe [module]") all of the
following modules which are currently running (determined using "lsmod"):
kvm, ksm, kvm-intel or kvm-amd.

3) Restart the KVM guest virtual machines.
--

SL5
  x86_64
    kmod-kvm-83-274.el5_11.x86_64.rpm
    kmod-kvm-debug-83-274.el5_11.x86_64.rpm
    kvm-83-274.el5_11.x86_64.rpm
    kvm-debuginfo-83-274.el5_11.x86_64.rpm
    kvm-qemu-img-83-274.el5_11.x86_64.rpm
    kvm-tools-83-274.el5_11.x86_64.rpm

- Scientific Linux Development Team