HP Security Bulletin HPSBHF03419 1

HP Security Bulletin HPSBHF03419 1 – A potential security vulnerability has been identified in HP Network Products including some H3C routers and switches. This is a Virtual routing and forwarding (VRF) hopping vulnerability that could be exploited remotely resulting in Denial of Service (DoS) or unauthorized access. Revision 1 of this advisory.

Red Hat Security Advisory 2015-2694-01

Red Hat Security Advisory 2015-2694-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU’s AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.

Red Hat Security Advisory 2015-2695-01

Red Hat Security Advisory 2015-2695-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU’s AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.

Red Hat Security Advisory 2015-2696-01

Red Hat Security Advisory 2015-2696-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. A heap-based buffer overflow flaw was discovered in the way QEMU’s AMD PC-Net II Ethernet Controller emulation received certain packets in loopback mode. A privileged user inside a guest could use this flaw to crash the host QEMU process or, potentially, execute arbitrary code with privileges of the host QEMU process.

CESA-2015:2694 Important CentOS 6 qemu-kvmSecurity Update

CentOS Errata and Security Advisory 2015:2694 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-2694.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
b696390d8917ac773ee6aec7aea75dc0b45e05987ef9d75af804fc55ee4c1beb  qemu-guest-agent-0.12.1.2-2.479.el6_7.3.i686.rpm

x86_64:
84f0bb42e2a41afb55ef562f922c1cf3930c2e6693c461f3f0e437b37616e2dc  qemu-guest-agent-0.12.1.2-2.479.el6_7.3.x86_64.rpm
5fec2687a04c15616dee3d8bc3461783e3e32ec9e665a103242a14d9cfc1ca0a  qemu-img-0.12.1.2-2.479.el6_7.3.x86_64.rpm
2d8f0b102815b4d4d3b33daa489d31879bea053d1f391ef280b5aaedb1198b34  qemu-kvm-0.12.1.2-2.479.el6_7.3.x86_64.rpm
26d6611cbece4dc9fb708a57c4051129059b407704b6367ec2744be3883d3d26  qemu-kvm-tools-0.12.1.2-2.479.el6_7.3.x86_64.rpm

Source:
d66c3e7a3148aac6f2c8925c8e48829429bd1cc856ece2ca8d30626145028f83  qemu-kvm-0.12.1.2-2.479.el6_7.3.src.rpm