Synopsis: Important: qemu-kvm security and bug fix update
Advisory ID: SLSA-2016:0083-1
Issue Date: 2016-01-28
CVE Numbers: CVE-2016-1714
—
An out-of-bounds read/write flaw was discovered in the way QEMU’s Firmware
Configuration device emulation processed certain firmware configurations.
A privileged (CAP_SYS_RAWIO) guest user could use this flaw to crash the
QEMU process instance or, potentially, execute arbitrary code on the host
with privileges of the QEMU process. (CVE-2016-1714)
This update also fixes the following bugs:
* Incorrect handling of the last sector of an image file could trigger an
assertion failure in qemu-img. This update changes the handling of the
last sector, and no assertion failure occurs.
After installing this update, shut down all running virtual machines. Once
all virtual machines have shut down, start them again for this update to
take effect.
—
SL7
x86_64
libcacard-1.5.3-105.el7_2.3.i686.rpm
libcacard-1.5.3-105.el7_2.3.x86_64.rpm
qemu-img-1.5.3-105.el7_2.3.x86_64.rpm
qemu-kvm-1.5.3-105.el7_2.3.x86_64.rpm
qemu-kvm-common-1.5.3-105.el7_2.3.x86_64.rpm
qemu-kvm-debuginfo-1.5.3-105.el7_2.3.i686.rpm
qemu-kvm-debuginfo-1.5.3-105.el7_2.3.x86_64.rpm
qemu-kvm-tools-1.5.3-105.el7_2.3.x86_64.rpm
libcacard-devel-1.5.3-105.el7_2.3.i686.rpm
libcacard-devel-1.5.3-105.el7_2.3.x86_64.rpm
libcacard-tools-1.5.3-105.el7_2.3.x86_64.rpm
– Scientific Linux Development Team