Date:         Wed, 19 May 2010 11:44:00 -0500
Reply-To:     Troy Dawson 
Sender:       Security Errata for Scientific Linux
              
From:         Troy Dawson 
Subject:      Security ERRATA Important: kvm on SL 5.4 x86_64
Comments: To: "scientific-linux-errata@fnal.gov"
          

Synopsis:	Important: kvm security, bug fix and enhancement update
Issue date:	2010-03-30
CVE Names:	CVE-2010-0741

A flaw was found in the way QEMU-KVM handled erroneous data provided by
the Linux virtio-net driver, used by guest operating systems. Due to a
deficiency in the TSO (TCP segment offloading) implementation, a guest's
virtio-net driver would transmit improper data to a certain QEMU-KVM
process on the host, causing the guest to crash. A remote attacker could
use this flaw to send specially-crafted data to a target guest system,
causing that guest to crash. (CVE-2010-0741)

The following procedure must be performed before this update will take
effect:

1) Stop all KVM guest virtual machines.

2) Either reboot the hypervisor machine or, as the root user, remove 
(using "modprobe -r [module]") and reload (using "modprobe [module]") 
all of the following modules which are currently running (determined 
using "lsmod"):
kvm, ksm, kvm-intel or kvm-amd.

3) Restart the KVM guest virtual machines.

SL 5.x

     SRPMS:
kvm-83-164.el5.src.rpm
     x86_64:
kmod-kvm-83-164.el5_5.9.x86_64.rpm
kvm-83-164.el5_5.9.x86_64.rpm
kvm-qemu-img-83-164.el5_5.9.x86_64.rpm
kvm-tools-83-164.el5_5.9.x86_64.rpm

-Connie Sieh
-Troy Dawson

SciLinux: CVE-2010-0741 Important: kvm SL 5.4 x86_64

Important: kvm security, bug fix and enhancement update

Summary

deficiency in the TSO (TCP segment offloading) implementation, a guest'svirtio-net driver would transmit improper data to a certain QEMU-KVMprocess on the host, causing the guest to crash. A remote attacker coulduse this flaw to send specially-crafted data to a target guest system,causing that guest to crash. (CVE-2010-0741)The following procedure must be performed before this update will takeeffect:1) Stop all KVM guest virtual machines.2) Either reboot the hypervisor machine or, as the root user, remove(using "modprobe -r [module]") and reload (using "modprobe [module]")all of the following modules which are currently running (determinedusing "lsmod"):kvm, ksm, kvm-intel or kvm-amd.3) Restart the KVM guest virtual machines.SL 5.xSRPMS:kvm-83-164.el5.src.rpmx86_64:kmod-kvm-83-164.el5_5.9.x86_64.rpmkvm-83-164.el5_5.9.x86_64.rpmkvm-qemu-img-83-164.el5_5.9.x86_64.rpmkvm-tools-83-164.el5_5.9.x86_64.rpm-Connie Sieh-Troy Dawson



Security Fixes

Severity
Issued Date: : 2010-03-30
CVE Names: CVE-2010-0741
A flaw was found in the way QEMU-KVM handled erroneous data provided by
the Linux virtio-net driver, used by guest operating systems. Due to a

Related News