Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: FEDORA-2016-389be30b95
Distribution: Fedora
Plattformen: Fedora 24
Datum: So, 19. Juni 2016, 00:34
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5238
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5242
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-2858
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4963
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4962
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4454
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4453

Originalnachricht

Name        : xen
Product : Fedora 24
Version : 4.6.1
Release : 11.fc24
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

-------------------------------------------------------------------------------
-
Update Information:

fix for CVE-2016-2858 doesn't build with qemu-xen enabled Unsanitised guest
input in libxl device handling code [XSA-175, CVE-2016-4962] (#1342132)
Unsanitised driver domain input in libxl device handling [XSA-178,
CVE-2016-4963] (#1342131) arm: Host crash caused by VMID exhaust [XSA-181]
(#1342530) Qemu: display: vmsvga: out-of-bounds read in vmsvga_fifo_read_raw()
routine [CVE-2016-4454] (#1340741) Qemu: display: vmsvga: infinite loop in
vmsvga_fifo_run() routine [CVE-2016-4453] (#1340746) Qemu: scsi: esp: OOB write
when using non-DMA mode in get_cmd [CVE-2016-5238] (#1341931)
-------------------------------------------------------------------------------
-
ChangeLog:

-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1341931 - CVE-2016-5238 Qemu: scsi: esp: OOB write when using
non-DMA mode in get_cmd
https://bugzilla.redhat.com/show_bug.cgi?id=1341931
[ 2 ] Bug #1335438 - CVE-2016-4962 xsa175 xen: Unsanitised guest input in
libxl device handling code (XSA-175)
https://bugzilla.redhat.com/show_bug.cgi?id=1335438
[ 3 ] Bug #1335442 - CVE-2016-4963 xsa178 xen: Unsanitised driver domain
input in libxl device handling (XSA-178)
https://bugzilla.redhat.com/show_bug.cgi?id=1335442
[ 4 ] Bug #1342529 - CVE-2016-5242 xsa181 xen: arm: Host crash caused by VMID
exhaustion (XSA-181)
https://bugzilla.redhat.com/show_bug.cgi?id=1342529
[ 5 ] Bug #1336429 - CVE-2016-4454 Qemu: display: vmsvga: out-of-bounds read
in vmsvga_fifo_read_raw() routine
https://bugzilla.redhat.com/show_bug.cgi?id=1336429
[ 6 ] Bug #1336650 - CVE-2016-4453 Qemu: display: vmsvga: infinite loop in
vmsvga_fifo_run() routine
https://bugzilla.redhat.com/show_bug.cgi?id=1336650
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung