You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa xen

Sigurnosni nedostaci programskog paketa xen

——————————————————————————–
Fedora Update Notification
FEDORA-2017-ed735463e3
2017-09-15 19:28:03.390969
——————————————————————————–

Name : xen
Product : Fedora 25
Version : 4.7.3
Release : 4.fc25
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

Qemu: usb: ohci: infinite loop due to incorrect return value [CVE-2017-9330]
(#1457698) Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
[CVE-2017-10664] (#1466466) revised full fix for XSA-226 (regressed 32-bit Dom0
or backend domains) —- full fix for XSA-226, replacing workaround drop
conflict of xendomain and libvirtd as can cause problems (#1398590) add-to-
physmap error paths fail to release lock on ARM [XSA-235] (#1484476) Qemu:
audio: host memory leakage via capture buffer [CVE-2017-8309] (#1446521) Qemu:
input: host memory leakage via keyboard events [CVE-2017-8379] (#1446561) —-
Qemu: serial: host memory leakage 16550A UART emulation [CVE-2017-5579]
(#1416162) Qemu: display: cirrus: OOB read access issue [CVE-2017-7718]
(#1443444) xen: various flaws (#1481765) multiple problems with transitive
grants [XSA-226, CVE-2017-12135] x86: PV privilege escalation via map_grant_ref
[XSA-227, CVE-2017-12137] grant_table: Race conditions with maptrack free list
handling [XSA-228, CVE-2017-12136] grant_table: possibly premature clearing of
GTF_writing / GTF_reading [XSA-230, CVE-2017-12855]
——————————————————————————–
References:

[ 1 ] Bug #1457697 – CVE-2017-9330 Qemu: usb: ohci: infinite loop due to incorrect return value
https://bugzilla.redhat.com/show_bug.cgi?id=1457697
[ 2 ] Bug #1466190 – CVE-2017-10664 Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
https://bugzilla.redhat.com/show_bug.cgi?id=1466190
[ 3 ] Bug #1484476 – xsa235 xen: add-to-physmap error paths fail to release lock on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1484476
[ 4 ] Bug #1446517 – CVE-2017-8309 Qemu: audio: host memory leakage via capture buffer
https://bugzilla.redhat.com/show_bug.cgi?id=1446517
[ 5 ] Bug #1446547 – CVE-2017-8379 Qemu: input: host memory lekage via keyboard events
https://bugzilla.redhat.com/show_bug.cgi?id=1446547
[ 6 ] Bug #1477651 – CVE-2017-12136 xsa228 xen: grant_table: Race conditions with maptrack free list handling (XSA-228)
https://bugzilla.redhat.com/show_bug.cgi?id=1477651
[ 7 ] Bug #1477655 – CVE-2017-12135 xsa226 xen: possibly unbounded recursion in grant table code (XSA-226)
https://bugzilla.redhat.com/show_bug.cgi?id=1477655
[ 8 ] Bug #1477657 – CVE-2017-12137 xsa227 xen: x86: PV privilege escalation via map_grant_ref (XSA-227)
https://bugzilla.redhat.com/show_bug.cgi?id=1477657
[ 9 ] Bug #1481762 – CVE-2017-12855 xsa230 CVE-2017-12855 xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230)
https://bugzilla.redhat.com/show_bug.cgi?id=1481762
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade xen’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa xen

Otkriveni su sigurnosni nedostaci u programskom paketu xen za operacijski sustav Fedora 26. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog...

Close