Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: FEDORA-2017-16a414b3c5
Distribution: Fedora
Plattformen: Fedora 26
Datum: Di, 2. Januar 2018, 23:01
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564
Applikationen: Xen

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2017-16a414b3c5
2018-01-02 14:44:38.578556
-------------------------------------------------------------------------------
-

Name : xen
Product : Fedora 26
Version : 4.8.2
Release : 9.fc26
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

-------------------------------------------------------------------------------
-
Update Information:

another patch related to the [XSA-240, CVE-2017-15595] issue xen: various flaws
(#1525018) x86 PV guests may gain access to internally used page [XSA-248]
broken x86 shadow mode refcount overflow check [XSA-249] improper x86 shadow
mode refcount error handling [XSA-250] improper bug check in x86 log-dirty
handling [XSA-251] ---- xen: various flaws (#1518214) x86: infinite loop due
to missing PoD error checking [XSA-246] Missing p2m error checking in PoD code
[XSA-247]
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1518656 - CVE-2017-17566 xsa248 xen: x86 PV guests may gain access
to internally used pages (XSA-248)
https://bugzilla.redhat.com/show_bug.cgi?id=1518656
[ 2 ] Bug #1518657 - CVE-2017-17563 xsa249 xen: broken x86 shadow mode
refcount overflow check (XSA-249)
https://bugzilla.redhat.com/show_bug.cgi?id=1518657
[ 3 ] Bug #1518658 - CVE-2017-17564 xsa250 xen: improper x86 shadow mode
refcount error handling (XSA-250)
https://bugzilla.redhat.com/show_bug.cgi?id=1518658
[ 4 ] Bug #1518659 - CVE-2017-17565 xsa251 xen: improper bug check in x86
log-dirty handling (XSA-251)
https://bugzilla.redhat.com/show_bug.cgi?id=1518659
[ 5 ] Bug #1513335 - CVE-2017-17044 xsa246 xen: x86: infinite loop due to
missing PoD error checking (XSA-246)
https://bugzilla.redhat.com/show_bug.cgi?id=1513335
[ 6 ] Bug #1513336 - CVE-2017-17045 xsa247 xen: Missing p2m error checking in
PoD code (XSA-247)
https://bugzilla.redhat.com/show_bug.cgi?id=1513336
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade xen' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung