SCIENTIFIC-LINUX-ERRATA Archives

November 2015

SCIENTIFIC-LINUX-ERRATA@LISTSERV.FNAL.GOV

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Pat Riehecky <[log in to unmask]>
Reply To:
Date:
Mon, 16 Nov 2015 20:48:18 +0000
Content-Type:
text/plain
Parts/Attachments:
text/plain (33 lines)
Synopsis:          Important: xen security update
Advisory ID:       SLSA-2015:2065-1
Issue Date:        2015-11-16
CVE Numbers:       CVE-2015-5279
--

A heap buffer overflow flaw was found in the way QEMU's NE2000 NIC
emulation implementation handled certain packets received over the
network. A privileged user inside a guest could use this flaw to crash the
QEMU instance (denial of service) or potentially execute arbitrary code on
the host. (CVE-2015-5279)

After installing the updated packages, all running fully-virtualized
guests must be restarted for this update to take effect.
--

SL5
  x86_64
    xen-debuginfo-3.0.3-147.el5_11.i386.rpm
    xen-debuginfo-3.0.3-147.el5_11.x86_64.rpm
    xen-libs-3.0.3-147.el5_11.i386.rpm
    xen-libs-3.0.3-147.el5_11.x86_64.rpm
    xen-3.0.3-147.el5_11.x86_64.rpm
    xen-devel-3.0.3-147.el5_11.i386.rpm
    xen-devel-3.0.3-147.el5_11.x86_64.rpm
  i386
    xen-debuginfo-3.0.3-147.el5_11.i386.rpm
    xen-libs-3.0.3-147.el5_11.i386.rpm
    xen-3.0.3-147.el5_11.i386.rpm
    xen-devel-3.0.3-147.el5_11.i386.rpm

- Scientific Linux Development Team

ATOM RSS1 RSS2