Ausführen von Code mit höheren Privilegien in Xen
ID: | FEDORA-2016-5d5a8bfbc5 |
Distribution: | Fedora |
Plattformen: | Fedora 24 |
Datum: | So, 22. Mai 2016, 09:47 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-4480 |
Applikationen: | Xen |
Originalnachricht |
|
Name : xen Product : Fedora 24 Version : 4.6.1 Release : 9.fc24 URL : http://xen.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor -------------------------------------------------------------------------------- Update Information: xen no longer crashes when built without -fno-tree-coalesce-vars, in systemd only try to load kernel modules that are in Fedora, x86 software guest page walk PS bit handling flaw [XSA-176, CVE-2016-4480] -------------------------------------------------------------------------------- References: [ 1 ] Bug #1332657 - CVE-2016-4480 xsa176 xen: x86 software guest page walk PS bit handling flaw (XSA-176) https://bugzilla.redhat.com/show_bug.cgi?id=1332657 -------------------------------------------------------------------------------- This update can be installed with the "yum" update program. Use su -c 'yum update xen' at the command line. For more information, refer to "Managing Software with yum", available at https://docs.fedoraproject.org/yum/. All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org http://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org |