Scientific Linux alert SLSA-2015:2065-1 (xen)
From: | Pat Riehecky <riehecky@fnal.gov> | |
To: | <scientific-linux-errata@listserv.fnal.gov> | |
Subject: | Security ERRATA Important: xen on SL5.x i386/x86_64 | |
Date: | Mon, 16 Nov 2015 20:48:18 +0000 | |
Message-ID: | <20151116204818.21327.82668@slpackages.fnal.gov> |
Synopsis: Important: xen security update Advisory ID: SLSA-2015:2065-1 Issue Date: 2015-11-16 CVE Numbers: CVE-2015-5279 -- A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC emulation implementation handled certain packets received over the network. A privileged user inside a guest could use this flaw to crash the QEMU instance (denial of service) or potentially execute arbitrary code on the host. (CVE-2015-5279) After installing the updated packages, all running fully-virtualized guests must be restarted for this update to take effect. -- SL5 x86_64 xen-debuginfo-3.0.3-147.el5_11.i386.rpm xen-debuginfo-3.0.3-147.el5_11.x86_64.rpm xen-libs-3.0.3-147.el5_11.i386.rpm xen-libs-3.0.3-147.el5_11.x86_64.rpm xen-3.0.3-147.el5_11.x86_64.rpm xen-devel-3.0.3-147.el5_11.i386.rpm xen-devel-3.0.3-147.el5_11.x86_64.rpm i386 xen-debuginfo-3.0.3-147.el5_11.i386.rpm xen-libs-3.0.3-147.el5_11.i386.rpm xen-3.0.3-147.el5_11.i386.rpm xen-devel-3.0.3-147.el5_11.i386.rpm - Scientific Linux Development Team