Synopsis: Low: qemu-kvm security and bug fix update
Advisory ID: SLSA-2017:0083-1
Issue Date: 2017-01-17
CVE Numbers: CVE-2016-2857
* An out-of-bounds read-access flaw was found in the QEMU emulator built
with IP checksum routines. The flaw could occur when computing a TCP/UDP
packet’s checksum, because a QEMU function used the packet’s payload
length without checking against the data buffer’s size. A user inside a
guest could use this flaw to crash the QEMU process (denial of service).
* Previously, rebooting a guest virtual machine more than 128 times in a
short period of time caused the guest to shut down instead of rebooting,
because the virtqueue was not cleaned properly. This update ensures that
the virtqueue is cleaned more reliably, which prevents the described
problem from occurring.
– Scientific Linux Development Team