7.7 High
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:A/AC:L/Au:S/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
41.0%
CentOS Errata and Security Advisory CESA-2015:1003
KVM (Kernel-based Virtual Machine) is a full virtualization solution for
Linux on AMD64 and Intel 64 systems.
An out-of-bounds memory access flaw was found in the way QEMUβs virtual
Floppy Disk Controller (FDC) handled FIFO buffer access while processing
certain FDC commands. A privileged guest user could use this flaw to crash
the guest or, potentially, execute arbitrary code on the host with the
privileges of the hostβs QEMU process corresponding to the guest.
(CVE-2015-3456)
Red Hat would like to thank Jason Geffner of CrowdStrike for reporting
this issue.
All kvm users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. Note: The procedure in
the Solution section must be performed before this update will take effect.
Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2015-May/083301.html
Affected packages:
kmod-kvm
kmod-kvm-debug
kvm
kvm-qemu-img
kvm-tools
Upstream details at:
https://access.redhat.com/errata/RHSA-2015:1003
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
CentOS | 5 | x86_64 | kmod-kvm | <Β 83-272.el5.centos | kmod-kvm-83-272.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | kmod-kvm-debug | <Β 83-272.el5.centos | kmod-kvm-debug-83-272.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | kvm | <Β 83-272.el5.centos | kvm-83-272.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | kvm-qemu-img | <Β 83-272.el5.centos | kvm-qemu-img-83-272.el5.centos.x86_64.rpm |
CentOS | 5 | x86_64 | kvm-tools | <Β 83-272.el5.centos | kvm-tools-83-272.el5.centos.x86_64.rpm |