Synopsis: Important: qemu-kvm security update Advisory ID: SLSA-2015:1924-1 Issue Date: 2015-10-22 CVE Numbers: CVE-2015-5279 -- A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host. (CVE-2015-5279) After installing this update, shut down all running virtual machines. Once all virtual machines have shut down, start them again for this update to take effect. -- SL6 x86_64 qemu-guest-agent-0.12.1.2-2.479.el6_7.2.x86_64.rpm qemu-img-0.12.1.2-2.479.el6_7.2.x86_64.rpm qemu-kvm-0.12.1.2-2.479.el6_7.2.x86_64.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.2.x86_64.rpm qemu-kvm-tools-0.12.1.2-2.479.el6_7.2.x86_64.rpm i386 qemu-guest-agent-0.12.1.2-2.479.el6_7.2.i686.rpm qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.2.i686.rpm - Scientific Linux Development Team