Synopsis: Important: kvm security update
Advisory ID: SLSA-2015:1189-1
Issue Date: 2015-06-25
CVE Numbers: CVE-2015-3209
—
A flaw was found in the way QEMU’s AMD PCnet Ethernet emulation handled
multi-TMD packets with a length above 4096 bytes. A privileged guest user
in a guest with an AMD PCNet ethernet card enabled could potentially use
this flaw to execute arbitrary code on the host with the privileges of the
hosting QEMU process. (CVE-2015-3209)
KVM must be “restarted” before this update will take effect.
Shutdown all KVM virtual machines.
Either reboot or unload and reload the following kernel modules : kvm, ksm, kvm-intel or kvm-amd.
Start the KVM virtual machines.
—
SL5
x86_64
kmod-kvm-83-273.el5_11.x86_64.rpm
kmod-kvm-debug-83-273.el5_11.x86_64.rpm
kvm-83-273.el5_11.x86_64.rpm
kvm-debuginfo-83-273.el5_11.x86_64.rpm
kvm-qemu-img-83-273.el5_11.x86_64.rpm
kvm-tools-83-273.el5_11.x86_64.rpm
– Scientific Linux Development Team