xen (SL5)

Synopsis: Important: xen security update
Advisory ID: SLSA-2015:2065-1
Issue Date: 2015-11-16
CVE Numbers: CVE-2015-5279

A heap buffer overflow flaw was found in the way QEMU’s NE2000 NIC
emulation implementation handled certain packets received over the
network. A privileged user inside a guest could use this flaw to crash the
QEMU instance (denial of service) or potentially execute arbitrary code on
the host. (CVE-2015-5279)

After installing the updated packages, all running fully-virtualized
guests must be restarted for this update to take effect.

SL5
x86_64
xen-debuginfo-3.0.3-147.el5_11.i386.rpm
xen-debuginfo-3.0.3-147.el5_11.x86_64.rpm
xen-libs-3.0.3-147.el5_11.i386.rpm
xen-libs-3.0.3-147.el5_11.x86_64.rpm
xen-3.0.3-147.el5_11.x86_64.rpm
xen-devel-3.0.3-147.el5_11.i386.rpm
xen-devel-3.0.3-147.el5_11.x86_64.rpm
i386
xen-debuginfo-3.0.3-147.el5_11.i386.rpm
xen-libs-3.0.3-147.el5_11.i386.rpm
xen-3.0.3-147.el5_11.i386.rpm
xen-devel-3.0.3-147.el5_11.i386.rpm

– Scientific Linux Development Team