ELSA-2015-2065

ELSA-2015-2065 - xen security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2015-11-16

Description


[3.0.3-147.el5]
- net: add checks to validate ring buffer pointers
- Resolves: bz#1263273
(xen: qemu: Heap overflow vulnerability in ne2000_receive() function)


Related CVEs


CVE-2015-5279

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 5 (i386) xen-3.0.3-147.el5_11.src.rpmd1b4b402c66990b1e8f3e77b3d67e84cf9801b06e908f8ee58c1c5997a7b00d0ELSA-2016-2963ol5_i386_latest
xen-3.0.3-147.el5_11.src.rpmd1b4b402c66990b1e8f3e77b3d67e84cf9801b06e908f8ee58c1c5997a7b00d0ELSA-2016-2963ol5_u11_i386_patch
xen-3.0.3-147.el5_11.i386.rpm006e57d3c902543b63e42da2de0c8660fc60b86992bc19ab47bff6f745b5472fELSA-2016-2963ol5_i386_latest
xen-3.0.3-147.el5_11.i386.rpm006e57d3c902543b63e42da2de0c8660fc60b86992bc19ab47bff6f745b5472fELSA-2016-2963ol5_u11_i386_patch
xen-devel-3.0.3-147.el5_11.i386.rpm93d88e70fc0216f94800aa95cfbbb74c810a5a913e935bbe2608930404d67410ELSA-2016-2963ol5_i386_latest
xen-devel-3.0.3-147.el5_11.i386.rpm93d88e70fc0216f94800aa95cfbbb74c810a5a913e935bbe2608930404d67410ELSA-2016-2963ol5_u11_i386_patch
xen-libs-3.0.3-147.el5_11.i386.rpm4d380113555458d30538eb196c33a4cacbb388867b8f8743f3746040ab7ce742ELSA-2016-2963ol5_i386_latest
xen-libs-3.0.3-147.el5_11.i386.rpm4d380113555458d30538eb196c33a4cacbb388867b8f8743f3746040ab7ce742ELSA-2016-2963ol5_u11_i386_patch
Oracle Linux 5 (ia64) xen-3.0.3-147.el5_11.src.rpmd1b4b402c66990b1e8f3e77b3d67e84cf9801b06e908f8ee58c1c5997a7b00d0ELSA-2016-2963ol5_ia64_latest
xen-3.0.3-147.el5_11.src.rpmd1b4b402c66990b1e8f3e77b3d67e84cf9801b06e908f8ee58c1c5997a7b00d0ELSA-2016-2963ol5_u11_ia64_patch
xen-3.0.3-147.el5_11.ia64.rpm0f84abaaacbe9c505d1bf103653a49a6e6f9e2700f4d70890ab214005dcd7d0bELSA-2016-2963ol5_ia64_latest
xen-3.0.3-147.el5_11.ia64.rpm0f84abaaacbe9c505d1bf103653a49a6e6f9e2700f4d70890ab214005dcd7d0bELSA-2016-2963ol5_u11_ia64_patch
xen-devel-3.0.3-147.el5_11.ia64.rpm10d3a1f886c8c0267b39a407505beee54ab72465eb270ff849e1b36bc675ce5dELSA-2016-2963ol5_ia64_latest
xen-devel-3.0.3-147.el5_11.ia64.rpm10d3a1f886c8c0267b39a407505beee54ab72465eb270ff849e1b36bc675ce5dELSA-2016-2963ol5_u11_ia64_patch
xen-libs-3.0.3-147.el5_11.ia64.rpm89bf39d07595cfe5be2d0cfb8f02eb9947f6aac1b8326f286060ac4d9e61c47fELSA-2016-2963ol5_ia64_latest
xen-libs-3.0.3-147.el5_11.ia64.rpm89bf39d07595cfe5be2d0cfb8f02eb9947f6aac1b8326f286060ac4d9e61c47fELSA-2016-2963ol5_u11_ia64_patch
Oracle Linux 5 (x86_64) xen-3.0.3-147.el5_11.src.rpmd1b4b402c66990b1e8f3e77b3d67e84cf9801b06e908f8ee58c1c5997a7b00d0ELSA-2016-2963ol5_u11_x86_64_patch
xen-3.0.3-147.el5_11.src.rpmd1b4b402c66990b1e8f3e77b3d67e84cf9801b06e908f8ee58c1c5997a7b00d0ELSA-2016-2963ol5_x86_64_latest
xen-3.0.3-147.el5_11.x86_64.rpm3f2997d4ebe0688f2e3204ba058d4e7daec79d2b96067637fe1b89058347f618ELSA-2016-2963ol5_u11_x86_64_patch
xen-3.0.3-147.el5_11.x86_64.rpm3f2997d4ebe0688f2e3204ba058d4e7daec79d2b96067637fe1b89058347f618ELSA-2016-2963ol5_x86_64_latest
xen-devel-3.0.3-147.el5_11.i386.rpm93d88e70fc0216f94800aa95cfbbb74c810a5a913e935bbe2608930404d67410ELSA-2016-2963ol5_u11_x86_64_patch
xen-devel-3.0.3-147.el5_11.i386.rpm93d88e70fc0216f94800aa95cfbbb74c810a5a913e935bbe2608930404d67410ELSA-2016-2963ol5_x86_64_latest
xen-devel-3.0.3-147.el5_11.x86_64.rpmf299fe0b5e1fb0f199031ced3418a8aed0d20393d8a5cc238a2f0bdb8244e4e0ELSA-2016-2963ol5_u11_x86_64_patch
xen-devel-3.0.3-147.el5_11.x86_64.rpmf299fe0b5e1fb0f199031ced3418a8aed0d20393d8a5cc238a2f0bdb8244e4e0ELSA-2016-2963ol5_x86_64_latest
xen-libs-3.0.3-147.el5_11.i386.rpm4d380113555458d30538eb196c33a4cacbb388867b8f8743f3746040ab7ce742ELSA-2016-2963ol5_u11_x86_64_patch
xen-libs-3.0.3-147.el5_11.i386.rpm4d380113555458d30538eb196c33a4cacbb388867b8f8743f3746040ab7ce742ELSA-2016-2963ol5_x86_64_latest
xen-libs-3.0.3-147.el5_11.x86_64.rpm25a77ebc0a1a37d95bc1985d64f82b3dfdad59c2d6299c86f232c7f220bbc335ELSA-2016-2963ol5_u11_x86_64_patch
xen-libs-3.0.3-147.el5_11.x86_64.rpm25a77ebc0a1a37d95bc1985d64f82b3dfdad59c2d6299c86f232c7f220bbc335ELSA-2016-2963ol5_x86_64_latest



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete