In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade Centos:6
qemu-kvm
to version 2:0.12.1.2-2.415.el6_5.10 or higher.
Note: Versions mentioned in the description apply only to the upstream qemu-kvm
package and not the qemu-kvm
package as distributed by Centos
.
See How to fix?
for Centos:6
relevant fixed versions and status.
Heap-based buffer overflow in the virtio_load function in hw/virtio/virtio.c in QEMU before 1.7.2 might allow remote attackers to execute arbitrary code via a crafted config length in a savevm image.