Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: FEDORA-2017-ed735463e3
Distribution: Fedora
Plattformen: Fedora 25
Datum: Sa, 16. September 2017, 11:50
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5579
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9330
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7718
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8379
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12136
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664
https://bugzilla.redhat.com/show_bug.cgi?id=1484476

Originalnachricht

--------------------------------------------------------------------------------

Fedora Update Notification
FEDORA-2017-ed735463e3
2017-09-15 19:28:03.390969
--------------------------------------------------------------------------------


Name : xen
Product : Fedora 25
Version : 4.7.3
Release : 4.fc25
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

--------------------------------------------------------------------------------

Update Information:

Qemu: usb: ohci: infinite loop due to incorrect return value [CVE-2017-9330]
(#1457698) Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort
[CVE-2017-10664] (#1466466) revised full fix for XSA-226 (regressed 32-bit
Dom0
or backend domains) ---- full fix for XSA-226, replacing workaround drop
conflict of xendomain and libvirtd as can cause problems (#1398590) add-to-
physmap error paths fail to release lock on ARM [XSA-235] (#1484476) Qemu:
audio: host memory leakage via capture buffer [CVE-2017-8309] (#1446521) Qemu:
input: host memory leakage via keyboard events [CVE-2017-8379] (#1446561)
----
Qemu: serial: host memory leakage 16550A UART emulation [CVE-2017-5579]
(#1416162) Qemu: display: cirrus: OOB read access issue [CVE-2017-7718]
(#1443444) xen: various flaws (#1481765) multiple problems with transitive
grants [XSA-226, CVE-2017-12135] x86: PV privilege escalation via
map_grant_ref
[XSA-227, CVE-2017-12137] grant_table: Race conditions with maptrack free list
handling [XSA-228, CVE-2017-12136] grant_table: possibly premature clearing of
GTF_writing / GTF_reading [XSA-230, CVE-2017-12855]
--------------------------------------------------------------------------------

References:

[ 1 ] Bug #1457697 - CVE-2017-9330 Qemu: usb: ohci: infinite loop due to
incorrect return value
https://bugzilla.redhat.com/show_bug.cgi?id=1457697
[ 2 ] Bug #1466190 - CVE-2017-10664 Qemu: qemu-nbd: server breaks with
SIGPIPE upon client abort
https://bugzilla.redhat.com/show_bug.cgi?id=1466190
[ 3 ] Bug #1484476 - xsa235 xen: add-to-physmap error paths fail to release
lock on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1484476
[ 4 ] Bug #1446517 - CVE-2017-8309 Qemu: audio: host memory leakage via
capture buffer
https://bugzilla.redhat.com/show_bug.cgi?id=1446517
[ 5 ] Bug #1446547 - CVE-2017-8379 Qemu: input: host memory lekage via
keyboard events
https://bugzilla.redhat.com/show_bug.cgi?id=1446547
[ 6 ] Bug #1477651 - CVE-2017-12136 xsa228 xen: grant_table: Race conditions
with maptrack free list handling (XSA-228)
https://bugzilla.redhat.com/show_bug.cgi?id=1477651
[ 7 ] Bug #1477655 - CVE-2017-12135 xsa226 xen: possibly unbounded recursion
in grant table code (XSA-226)
https://bugzilla.redhat.com/show_bug.cgi?id=1477655
[ 8 ] Bug #1477657 - CVE-2017-12137 xsa227 xen: x86: PV privilege escalation
via map_grant_ref (XSA-227)
https://bugzilla.redhat.com/show_bug.cgi?id=1477657
[ 9 ] Bug #1481762 - CVE-2017-12855 xsa230 CVE-2017-12855 xen: grant_table:
possibly premature clearing of GTF_writing / GTF_reading (XSA-230)
https://bugzilla.redhat.com/show_bug.cgi?id=1481762
--------------------------------------------------------------------------------


This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade xen' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung