Updated xen packages that fix one security issue are now available for RedHat Enterprise Linux 5.Red Hat Product Security has rated this update as having Important securityimpact. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available from the CVE link in theReferences section.

The xen packages contain administration tools and the xend service formanaging the kernel-xen kernel for virtualization on Red Hat EnterpriseLinux.An out-of-bounds memory access flaw was found in the way QEMU’s virtualFloppy Disk Controller (FDC) handled FIFO buffer access while processingcertain FDC commands. A privileged guest user could use this flaw to crashthe guest or, potentially, execute arbitrary code on the host with theprivileges of the host’s QEMU process corresponding to the guest.(CVE-2015-3456)Red Hat would like to thank Jason Geffner of CrowdStrike for reportingthis issue.All xen users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. After installing theupdated packages, all running fully-virtualized guests must be restartedfor this update to take effect.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-146.el5_11.src.rpm
    MD5: 71b83faf739baa16ce42e8df5f1c0f87SHA-256: aa2fead48f82d090760ba79031c66dd5003e90f7b47caf3b94cc7012bd0d18d2
 
IA-32:
xen-3.0.3-146.el5_11.i386.rpm
    MD5: 40cbd508223a10a20cbb26145756ff91SHA-256: 5d4563d737636a0905272f08ed4a317a0f375c751248832d68fe1779cfc45c49
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
    MD5: 5fc7564f80682621fde85569042402f0SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-devel-3.0.3-146.el5_11.i386.rpm
    MD5: a7570a276163579ab3793f535465ad41SHA-256: 444f6f6ed0c98d4762ad7ced346903473af8b23966d7f8bf7395b15bed51265b
 
x86_64:
xen-3.0.3-146.el5_11.x86_64.rpm
    MD5: 07811028d1559b0efe7998615eaa0cfbSHA-256: eb0c3d92de12521766ac8426cbef679043d27d0118171e587ddfb391790433b8
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
    MD5: 5fc7564f80682621fde85569042402f0SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm
    MD5: c6988c12611702358c8c98f882eef057SHA-256: 1bd0b8b61edf44a70facdd638a934ec58151390c9b2cf2704542d8721b508d2f
xen-devel-3.0.3-146.el5_11.i386.rpm
    MD5: a7570a276163579ab3793f535465ad41SHA-256: 444f6f6ed0c98d4762ad7ced346903473af8b23966d7f8bf7395b15bed51265b
xen-devel-3.0.3-146.el5_11.x86_64.rpm
    MD5: 2bebd85d56c9a3c0466ff6686792b4a9SHA-256: 898669c684ae695ab03c1be3bd2a2ca3859ea257838e7b4d046d00e3b6c8c897
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-146.el5_11.src.rpm
    MD5: 71b83faf739baa16ce42e8df5f1c0f87SHA-256: aa2fead48f82d090760ba79031c66dd5003e90f7b47caf3b94cc7012bd0d18d2
 
IA-32:
xen-3.0.3-146.el5_11.i386.rpm
    MD5: 40cbd508223a10a20cbb26145756ff91SHA-256: 5d4563d737636a0905272f08ed4a317a0f375c751248832d68fe1779cfc45c49
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
    MD5: 5fc7564f80682621fde85569042402f0SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-devel-3.0.3-146.el5_11.i386.rpm
    MD5: a7570a276163579ab3793f535465ad41SHA-256: 444f6f6ed0c98d4762ad7ced346903473af8b23966d7f8bf7395b15bed51265b
 
IA-64:
xen-3.0.3-146.el5_11.ia64.rpm
    MD5: d898132835c3e66c7d66d83781d5b6baSHA-256: f38d8b2ae5ffeb6eebab20a78b591b534ee099860c12887d159a031596b5f4bd
xen-debuginfo-3.0.3-146.el5_11.ia64.rpm
    MD5: e355a18715327b61dd19f64adb45344aSHA-256: f5193189377198da84baed6064a6c87028c897f65eb3f0e967c2904e0f3fd856
xen-devel-3.0.3-146.el5_11.ia64.rpm
    MD5: cfa83f04286dde7f236c55e104c31992SHA-256: 3f268bfe9cc4722b7002ef5a19f9ffa0ae26a4b8c850b7adce82d0ebd61048ae
 
x86_64:
xen-3.0.3-146.el5_11.x86_64.rpm
    MD5: 07811028d1559b0efe7998615eaa0cfbSHA-256: eb0c3d92de12521766ac8426cbef679043d27d0118171e587ddfb391790433b8
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
    MD5: 5fc7564f80682621fde85569042402f0SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm
    MD5: c6988c12611702358c8c98f882eef057SHA-256: 1bd0b8b61edf44a70facdd638a934ec58151390c9b2cf2704542d8721b508d2f
xen-devel-3.0.3-146.el5_11.i386.rpm
    MD5: a7570a276163579ab3793f535465ad41SHA-256: 444f6f6ed0c98d4762ad7ced346903473af8b23966d7f8bf7395b15bed51265b
xen-devel-3.0.3-146.el5_11.x86_64.rpm
    MD5: 2bebd85d56c9a3c0466ff6686792b4a9SHA-256: 898669c684ae695ab03c1be3bd2a2ca3859ea257838e7b4d046d00e3b6c8c897
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-146.el5_11.src.rpm
    MD5: 71b83faf739baa16ce42e8df5f1c0f87SHA-256: aa2fead48f82d090760ba79031c66dd5003e90f7b47caf3b94cc7012bd0d18d2
 
IA-32:
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
    MD5: 5fc7564f80682621fde85569042402f0SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-libs-3.0.3-146.el5_11.i386.rpm
    MD5: 82086d1c9d787324e22f065103359f08SHA-256: 61d66fcbd931a5f96def556183783dc24b46a71fd2f784602130955d0684902e
 
IA-64:
xen-debuginfo-3.0.3-146.el5_11.ia64.rpm
    MD5: e355a18715327b61dd19f64adb45344aSHA-256: f5193189377198da84baed6064a6c87028c897f65eb3f0e967c2904e0f3fd856
xen-libs-3.0.3-146.el5_11.ia64.rpm
    MD5: 31b566b3d613a320cb6eaad97f473bb4SHA-256: 64c33bb10af00a75d9280368aaf4a9c0ec14f5c7f6d16d94a3ddef44c0a05664
 
x86_64:
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
    MD5: 5fc7564f80682621fde85569042402f0SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm
    MD5: c6988c12611702358c8c98f882eef057SHA-256: 1bd0b8b61edf44a70facdd638a934ec58151390c9b2cf2704542d8721b508d2f
xen-libs-3.0.3-146.el5_11.i386.rpm
    MD5: 82086d1c9d787324e22f065103359f08SHA-256: 61d66fcbd931a5f96def556183783dc24b46a71fd2f784602130955d0684902e
xen-libs-3.0.3-146.el5_11.x86_64.rpm
    MD5: 5963b3ddee793426e68408a2b3633982SHA-256: 75cf242556f03812631f6963fee251bd747d2103d8bb4719ea06eb65038ed948
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-146.el5_11.src.rpm
    MD5: 71b83faf739baa16ce42e8df5f1c0f87SHA-256: aa2fead48f82d090760ba79031c66dd5003e90f7b47caf3b94cc7012bd0d18d2
 
IA-32:
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
    MD5: 5fc7564f80682621fde85569042402f0SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-libs-3.0.3-146.el5_11.i386.rpm
    MD5: 82086d1c9d787324e22f065103359f08SHA-256: 61d66fcbd931a5f96def556183783dc24b46a71fd2f784602130955d0684902e
 
x86_64:
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
    MD5: 5fc7564f80682621fde85569042402f0SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm
    MD5: c6988c12611702358c8c98f882eef057SHA-256: 1bd0b8b61edf44a70facdd638a934ec58151390c9b2cf2704542d8721b508d2f
xen-libs-3.0.3-146.el5_11.i386.rpm
    MD5: 82086d1c9d787324e22f065103359f08SHA-256: 61d66fcbd931a5f96def556183783dc24b46a71fd2f784602130955d0684902e
xen-libs-3.0.3-146.el5_11.x86_64.rpm
    MD5: 5963b3ddee793426e68408a2b3633982SHA-256: 75cf242556f03812631f6963fee251bd747d2103d8bb4719ea06eb65038ed948
 
(The unlinked packages above are only available from the Red Hat Network)
1218611 – CVE-2015-3456 qemu: fdc: out-of-bounds fifo buffer memory access

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply