|
|
Subscribe / Log in / New account

Scientific Linux alert SLSA-2015:1002-1 (xen)

From:  Pat Riehecky <riehecky@fnal.gov>
To:  <scientific-linux-errata@listserv.fnal.gov>
Subject:  Security ERRATA Important: xen on SL5.x i386/x86_64
Date:  Wed, 13 May 2015 15:15:00 +0000
Message-ID:  <20150513151500.17120.9685@slpackages.fnal.gov>

Synopsis: Important: xen security update Advisory ID: SLSA-2015:1002-1 Issue Date: 2015-05-13 CVE Numbers: CVE-2015-3456 -- An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller (FDC) handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest. (CVE-2015-3456) After installing the updated packages, all running fully-virtualized guests must be restarted for this update to take effect. -- SL5 x86_64 xen-debuginfo-3.0.3-146.el5_11.i386.rpm xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm xen-libs-3.0.3-146.el5_11.i386.rpm xen-libs-3.0.3-146.el5_11.x86_64.rpm xen-3.0.3-146.el5_11.x86_64.rpm xen-devel-3.0.3-146.el5_11.i386.rpm xen-devel-3.0.3-146.el5_11.x86_64.rpm i386 xen-debuginfo-3.0.3-146.el5_11.i386.rpm xen-libs-3.0.3-146.el5_11.i386.rpm xen-3.0.3-146.el5_11.i386.rpm xen-devel-3.0.3-146.el5_11.i386.rpm - Scientific Linux Development Team


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds