——————————————————————————–
Fedora Update Notification
FEDORA-2017-16a414b3c5
2018-01-02 14:44:38.578556
——————————————————————————–
Name : xen
Product : Fedora 26
Version : 4.8.2
Release : 9.fc26
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
——————————————————————————–
Update Information:
another patch related to the [XSA-240, CVE-2017-15595] issue xen: various flaws
(#1525018) x86 PV guests may gain access to internally used page [XSA-248]
broken x86 shadow mode refcount overflow check [XSA-249] improper x86 shadow
mode refcount error handling [XSA-250] improper bug check in x86 log-dirty
handling [XSA-251] —- xen: various flaws (#1518214) x86: infinite loop due
to missing PoD error checking [XSA-246] Missing p2m error checking in PoD code
[XSA-247]
——————————————————————————–
References:
[ 1 ] Bug #1518656 – CVE-2017-17566 xsa248 xen: x86 PV guests may gain access to internally used pages (XSA-248)
https://bugzilla.redhat.com/show_bug.cgi?id=1518656
[ 2 ] Bug #1518657 – CVE-2017-17563 xsa249 xen: broken x86 shadow mode refcount overflow check (XSA-249)
https://bugzilla.redhat.com/show_bug.cgi?id=1518657
[ 3 ] Bug #1518658 – CVE-2017-17564 xsa250 xen: improper x86 shadow mode refcount error handling (XSA-250)
https://bugzilla.redhat.com/show_bug.cgi?id=1518658
[ 4 ] Bug #1518659 – CVE-2017-17565 xsa251 xen: improper bug check in x86 log-dirty handling (XSA-251)
https://bugzilla.redhat.com/show_bug.cgi?id=1518659
[ 5 ] Bug #1513335 – CVE-2017-17044 xsa246 xen: x86: infinite loop due to missing PoD error checking (XSA-246)
https://bugzilla.redhat.com/show_bug.cgi?id=1513335
[ 6 ] Bug #1513336 – CVE-2017-17045 xsa247 xen: Missing p2m error checking in PoD code (XSA-247)
https://bugzilla.redhat.com/show_bug.cgi?id=1513336
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade xen’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org