Synopsis: Important: kvm security update Advisory ID: SLSA-2015:1925-1 Issue Date: 2015-10-22 CVE Numbers: CVE-2015-5279 -- A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host. (CVE-2015-5279) NOTE: The following procedure must be performed before this update will take effect: 1) Stop all KVM guest virtual machines. 2) Either reboot the hypervisor machine or, as the root user, remove (using "modprobe -r [module]") and reload (using "modprobe [module]") all of the following modules which are currently running (determined using "lsmod"): kvm, ksm, kvm-intel or kvm-amd. 3) Restart the KVM guest virtual machines. -- SL5 x86_64 kmod-kvm-83-274.el5_11.x86_64.rpm kmod-kvm-debug-83-274.el5_11.x86_64.rpm kvm-83-274.el5_11.x86_64.rpm kvm-debuginfo-83-274.el5_11.x86_64.rpm kvm-qemu-img-83-274.el5_11.x86_64.rpm kvm-tools-83-274.el5_11.x86_64.rpm - Scientific Linux Development Team