Scientific Linux Security Update : kvm on SL5.x x86_64

This script is Copyright (C) 2015 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A flaw was found in the way QEMU's AMD PCnet Ethernet emulation
handled multi-TMD packets with a length above 4096 bytes. A privileged
guest user in a guest with an AMD PCNet ethernet card enabled could
potentially use this flaw to execute arbitrary code on the host with
the privileges of the hosting QEMU process. (CVE-2015-3209)

KVM must be 'restarted' before this update will take effect.

Shutdown all KVM virtual machines.

Either reboot or unload and reload the following kernel
modules : kvm, ksm, kvm-intel or kvm-amd.

Start the KVM virtual machines.

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.5

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 84538 ()

Bugtraq ID:

CVE ID: CVE-2015-3209

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now