You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Xen

Sigurnosni nedostaci programskog paketa Xen

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201412-42
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
http://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: Xen: Denial of Service
Date: December 26, 2014
Bugs: #523524, #524200
ID: 201412-42

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Multiple vulnerabilities have been found in Xen, possibly resulting in
Denial of Service.

Background
==========

Xen is a bare-metal hypervisor.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 app-emulation/xen < 4.4.1-r2 *>= 4.2.5-r1
>= 4.4.1-r2

Description
===========

Multiple vulnerabilities have been discovered in Xen. Please review the
CVE identifiers referenced below for details.

Impact
======

A local user could possibly cause a Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Xen 4.2 users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=app-emulation/xen-4.2.5-r1”

All Xen 4.4 users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=app-emulation/xen-4.4.1-r2”

References
==========

[ 1 ] CVE-2014-7154
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7154
[ 2 ] CVE-2014-7155
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7155
[ 3 ] CVE-2014-7156
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7156
[ 4 ] CVE-2014-7188
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7188

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201412-42.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

—–BEGIN PGP SIGNATURE—–
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
Comment: GPGTools – https://gpgtools.org
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=WzFG
—–END PGP SIGNATURE—–

Top
More in Preporuke
Višestruke ranjivosti programskog paketa openssl

Otkrivene su višestruke ranjivosti programskog paketa openssl za operacijski sustav Gentoo. Potencijalni udaljeni napadači mogli bi iskoristiti ranjivosti za uskraćivanje...

Close