Security Advisory Important: xen security update

Advisory: RHSA-2015:1002-1
Type: Security Advisory
Severity: Important
Issued on: 2015-05-13
Last updated on: 2015-05-13
Affected Products: RHEL Desktop Multi OS (v. 5 client)
RHEL Virtualization (v. 5 server)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
CVEs (cve.mitre.org): CVE-2015-3456

Details

Updated xen packages that fix one security issue are now available for Red
Hat Enterprise Linux 5.

Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.

The xen packages contain administration tools and the xend service for
managing the kernel-xen kernel for virtualization on Red Hat Enterprise
Linux.

An out-of-bounds memory access flaw was found in the way QEMU's virtual
Floppy Disk Controller (FDC) handled FIFO buffer access while processing
certain FDC commands. A privileged guest user could use this flaw to crash
the guest or, potentially, execute arbitrary code on the host with the
privileges of the host's QEMU process corresponding to the guest.
(CVE-2015-3456)

Red Hat would like to thank Jason Geffner of CrowdStrike for reporting
this issue.

All xen users are advised to upgrade to these updated packages, which
contain a backported patch to correct this issue. After installing the
updated packages, all running fully-virtualized guests must be restarted
for this update to take effect.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Updated packages

RHEL Desktop Multi OS (v. 5 client)

SRPMS:
xen-3.0.3-146.el5_11.src.rpm
File outdated by:  RHSA-2016:2963
    MD5: 71b83faf739baa16ce42e8df5f1c0f87
SHA-256: aa2fead48f82d090760ba79031c66dd5003e90f7b47caf3b94cc7012bd0d18d2
 
IA-32:
xen-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 40cbd508223a10a20cbb26145756ff91
SHA-256: 5d4563d737636a0905272f08ed4a317a0f375c751248832d68fe1779cfc45c49
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5fc7564f80682621fde85569042402f0
SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-devel-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: a7570a276163579ab3793f535465ad41
SHA-256: 444f6f6ed0c98d4762ad7ced346903473af8b23966d7f8bf7395b15bed51265b
 
x86_64:
xen-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: 07811028d1559b0efe7998615eaa0cfb
SHA-256: eb0c3d92de12521766ac8426cbef679043d27d0118171e587ddfb391790433b8
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5fc7564f80682621fde85569042402f0
SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: c6988c12611702358c8c98f882eef057
SHA-256: 1bd0b8b61edf44a70facdd638a934ec58151390c9b2cf2704542d8721b508d2f
xen-devel-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: a7570a276163579ab3793f535465ad41
SHA-256: 444f6f6ed0c98d4762ad7ced346903473af8b23966d7f8bf7395b15bed51265b
xen-devel-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: 2bebd85d56c9a3c0466ff6686792b4a9
SHA-256: 898669c684ae695ab03c1be3bd2a2ca3859ea257838e7b4d046d00e3b6c8c897
 
RHEL Virtualization (v. 5 server)

SRPMS:
xen-3.0.3-146.el5_11.src.rpm
File outdated by:  RHSA-2016:2963
    MD5: 71b83faf739baa16ce42e8df5f1c0f87
SHA-256: aa2fead48f82d090760ba79031c66dd5003e90f7b47caf3b94cc7012bd0d18d2
 
IA-32:
xen-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 40cbd508223a10a20cbb26145756ff91
SHA-256: 5d4563d737636a0905272f08ed4a317a0f375c751248832d68fe1779cfc45c49
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5fc7564f80682621fde85569042402f0
SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-devel-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: a7570a276163579ab3793f535465ad41
SHA-256: 444f6f6ed0c98d4762ad7ced346903473af8b23966d7f8bf7395b15bed51265b
 
IA-64:
xen-3.0.3-146.el5_11.ia64.rpm
File outdated by:  RHSA-2016:2963
    MD5: d898132835c3e66c7d66d83781d5b6ba
SHA-256: f38d8b2ae5ffeb6eebab20a78b591b534ee099860c12887d159a031596b5f4bd
xen-debuginfo-3.0.3-146.el5_11.ia64.rpm
File outdated by:  RHSA-2016:2963
    MD5: e355a18715327b61dd19f64adb45344a
SHA-256: f5193189377198da84baed6064a6c87028c897f65eb3f0e967c2904e0f3fd856
xen-devel-3.0.3-146.el5_11.ia64.rpm
File outdated by:  RHSA-2016:2963
    MD5: cfa83f04286dde7f236c55e104c31992
SHA-256: 3f268bfe9cc4722b7002ef5a19f9ffa0ae26a4b8c850b7adce82d0ebd61048ae
 
x86_64:
xen-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: 07811028d1559b0efe7998615eaa0cfb
SHA-256: eb0c3d92de12521766ac8426cbef679043d27d0118171e587ddfb391790433b8
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5fc7564f80682621fde85569042402f0
SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: c6988c12611702358c8c98f882eef057
SHA-256: 1bd0b8b61edf44a70facdd638a934ec58151390c9b2cf2704542d8721b508d2f
xen-devel-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: a7570a276163579ab3793f535465ad41
SHA-256: 444f6f6ed0c98d4762ad7ced346903473af8b23966d7f8bf7395b15bed51265b
xen-devel-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: 2bebd85d56c9a3c0466ff6686792b4a9
SHA-256: 898669c684ae695ab03c1be3bd2a2ca3859ea257838e7b4d046d00e3b6c8c897
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
xen-3.0.3-146.el5_11.src.rpm
File outdated by:  RHSA-2016:2963
    MD5: 71b83faf739baa16ce42e8df5f1c0f87
SHA-256: aa2fead48f82d090760ba79031c66dd5003e90f7b47caf3b94cc7012bd0d18d2
 
IA-32:
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5fc7564f80682621fde85569042402f0
SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-libs-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 82086d1c9d787324e22f065103359f08
SHA-256: 61d66fcbd931a5f96def556183783dc24b46a71fd2f784602130955d0684902e
 
IA-64:
xen-debuginfo-3.0.3-146.el5_11.ia64.rpm
File outdated by:  RHSA-2016:2963
    MD5: e355a18715327b61dd19f64adb45344a
SHA-256: f5193189377198da84baed6064a6c87028c897f65eb3f0e967c2904e0f3fd856
xen-libs-3.0.3-146.el5_11.ia64.rpm
File outdated by:  RHSA-2016:2963
    MD5: 31b566b3d613a320cb6eaad97f473bb4
SHA-256: 64c33bb10af00a75d9280368aaf4a9c0ec14f5c7f6d16d94a3ddef44c0a05664
 
x86_64:
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5fc7564f80682621fde85569042402f0
SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: c6988c12611702358c8c98f882eef057
SHA-256: 1bd0b8b61edf44a70facdd638a934ec58151390c9b2cf2704542d8721b508d2f
xen-libs-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 82086d1c9d787324e22f065103359f08
SHA-256: 61d66fcbd931a5f96def556183783dc24b46a71fd2f784602130955d0684902e
xen-libs-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5963b3ddee793426e68408a2b3633982
SHA-256: 75cf242556f03812631f6963fee251bd747d2103d8bb4719ea06eb65038ed948
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
xen-3.0.3-146.el5_11.src.rpm
File outdated by:  RHSA-2016:2963
    MD5: 71b83faf739baa16ce42e8df5f1c0f87
SHA-256: aa2fead48f82d090760ba79031c66dd5003e90f7b47caf3b94cc7012bd0d18d2
 
IA-32:
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5fc7564f80682621fde85569042402f0
SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-libs-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 82086d1c9d787324e22f065103359f08
SHA-256: 61d66fcbd931a5f96def556183783dc24b46a71fd2f784602130955d0684902e
 
x86_64:
xen-debuginfo-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5fc7564f80682621fde85569042402f0
SHA-256: 147abf20e007f54762251c930907b26b5c62d2fec4ce502bec30fa3a555a9989
xen-debuginfo-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: c6988c12611702358c8c98f882eef057
SHA-256: 1bd0b8b61edf44a70facdd638a934ec58151390c9b2cf2704542d8721b508d2f
xen-libs-3.0.3-146.el5_11.i386.rpm
File outdated by:  RHSA-2016:2963
    MD5: 82086d1c9d787324e22f065103359f08
SHA-256: 61d66fcbd931a5f96def556183783dc24b46a71fd2f784602130955d0684902e
xen-libs-3.0.3-146.el5_11.x86_64.rpm
File outdated by:  RHSA-2016:2963
    MD5: 5963b3ddee793426e68408a2b3633982
SHA-256: 75cf242556f03812631f6963fee251bd747d2103d8bb4719ea06eb65038ed948
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1218611 - CVE-2015-3456 qemu: fdc: out-of-bounds fifo buffer memory access


References



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/