This script is Copyright (C) 2016 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
An out-of-bounds read/write flaw was discovered in the way QEMU's
Firmware Configuration device emulation processed certain firmware
configurations. A privileged (CAP_SYS_RAWIO) guest user could use this
flaw to crash the QEMU process instance or, potentially, execute
arbitrary code on the host with privileges of the QEMU process.
This update also fixes the following bugs :
- Incorrect handling of the last sector of an image file
could trigger an assertion failure in qemu-img. This
update changes the handling of the last sector, and no
assertion failure occurs.
After installing this update, shut down all running virtual machines.
Once all virtual machines have shut down, start them again for this
update to take effect.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.9