Synopsis: Important: qemu-kvm security update
Advisory ID: SLSA-2015:1924-1
Issue Date: 2015-10-22
CVE Numbers: CVE-2015-5279
—
A heap buffer overflow flaw was found in the way QEMU’s NE2000 NIC
emulation implementation handled certain packets received over the
network. A privileged user inside a guest could use this flaw to crash the
QEMU instance (denial of service) or potentially execute arbitrary code on
the host. (CVE-2015-5279)
After installing this update, shut down all running virtual machines. Once
all virtual machines have shut down, start them again for this update to
take effect.
—
SL6
x86_64
qemu-guest-agent-0.12.1.2-2.479.el6_7.2.x86_64.rpm
qemu-img-0.12.1.2-2.479.el6_7.2.x86_64.rpm
qemu-kvm-0.12.1.2-2.479.el6_7.2.x86_64.rpm
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.2.x86_64.rpm
qemu-kvm-tools-0.12.1.2-2.479.el6_7.2.x86_64.rpm
i386
qemu-guest-agent-0.12.1.2-2.479.el6_7.2.i686.rpm
qemu-kvm-debuginfo-0.12.1.2-2.479.el6_7.2.i686.rpm
– Scientific Linux Development Team