Rapid7 Vulnerability & Exploit Database

RHSA-2015:2065: xen security update

Back to Search

RHSA-2015:2065: xen security update

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
09/28/2015
Created
07/25/2018
Added
11/20/2015
Modified
07/04/2017

Description

The xen packages contain administration tools and the xend service formanaging the kernel-xen kernel for virtualization on Red Hat EnterpriseLinux.A heap buffer overflow flaw was found in the way QEMU's NE2000 NICemulation implementation handled certain packets received over the network.A privileged user inside a guest could use this flaw to crash the QEMUinstance (denial of service) or potentially execute arbitrary code on thehost. (CVE-2015-5279)Red Hat would like to thank Qinghao Tang of QIHU 360 Inc. for reportingthis issue.All xen users are advised to upgrade to these updated packages, whichcontain a backported patch to correct this issue. After installing theupdated packages, all running fully-virtualized guests must be restartedfor this update to take effect.

Solution(s)

  • redhat-upgrade-xen
  • redhat-upgrade-xen-debuginfo
  • redhat-upgrade-xen-devel
  • redhat-upgrade-xen-libs

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;