Mehrere Probleme in Xen
ID: | FEDORA-2017-ed735463e3 |
Distribution: | Fedora |
Plattformen: | Fedora 25 |
Datum: | Sa, 16. September 2017, 11:50 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5579
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9330 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7718 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12137 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8309 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12135 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12855 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-8379 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-12136 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10664 https://bugzilla.redhat.com/show_bug.cgi?id=1484476 |
Applikationen: | Xen |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2017-ed735463e3 2017-09-15 19:28:03.390969 -------------------------------------------------------------------------------- Name : xen Product : Fedora 25 Version : 4.7.3 Release : 4.fc25 URL : http://xen.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor -------------------------------------------------------------------------------- Update Information: Qemu: usb: ohci: infinite loop due to incorrect return value [CVE-2017-9330] (#1457698) Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort [CVE-2017-10664] (#1466466) revised full fix for XSA-226 (regressed 32-bit Dom0 or backend domains) ---- full fix for XSA-226, replacing workaround drop conflict of xendomain and libvirtd as can cause problems (#1398590) add-to- physmap error paths fail to release lock on ARM [XSA-235] (#1484476) Qemu: audio: host memory leakage via capture buffer [CVE-2017-8309] (#1446521) Qemu: input: host memory leakage via keyboard events [CVE-2017-8379] (#1446561) ---- Qemu: serial: host memory leakage 16550A UART emulation [CVE-2017-5579] (#1416162) Qemu: display: cirrus: OOB read access issue [CVE-2017-7718] (#1443444) xen: various flaws (#1481765) multiple problems with transitive grants [XSA-226, CVE-2017-12135] x86: PV privilege escalation via map_grant_ref [XSA-227, CVE-2017-12137] grant_table: Race conditions with maptrack free list handling [XSA-228, CVE-2017-12136] grant_table: possibly premature clearing of GTF_writing / GTF_reading [XSA-230, CVE-2017-12855] -------------------------------------------------------------------------------- References: [ 1 ] Bug #1457697 - CVE-2017-9330 Qemu: usb: ohci: infinite loop due to incorrect return value https://bugzilla.redhat.com/show_bug.cgi?id=1457697 [ 2 ] Bug #1466190 - CVE-2017-10664 Qemu: qemu-nbd: server breaks with SIGPIPE upon client abort https://bugzilla.redhat.com/show_bug.cgi?id=1466190 [ 3 ] Bug #1484476 - xsa235 xen: add-to-physmap error paths fail to release lock on ARM https://bugzilla.redhat.com/show_bug.cgi?id=1484476 [ 4 ] Bug #1446517 - CVE-2017-8309 Qemu: audio: host memory leakage via capture buffer https://bugzilla.redhat.com/show_bug.cgi?id=1446517 [ 5 ] Bug #1446547 - CVE-2017-8379 Qemu: input: host memory lekage via keyboard events https://bugzilla.redhat.com/show_bug.cgi?id=1446547 [ 6 ] Bug #1477651 - CVE-2017-12136 xsa228 xen: grant_table: Race conditions with maptrack free list handling (XSA-228) https://bugzilla.redhat.com/show_bug.cgi?id=1477651 [ 7 ] Bug #1477655 - CVE-2017-12135 xsa226 xen: possibly unbounded recursion in grant table code (XSA-226) https://bugzilla.redhat.com/show_bug.cgi?id=1477655 [ 8 ] Bug #1477657 - CVE-2017-12137 xsa227 xen: x86: PV privilege escalation via map_grant_ref (XSA-227) https://bugzilla.redhat.com/show_bug.cgi?id=1477657 [ 9 ] Bug #1481762 - CVE-2017-12855 xsa230 CVE-2017-12855 xen: grant_table: possibly premature clearing of GTF_writing / GTF_reading (XSA-230) https://bugzilla.redhat.com/show_bug.cgi?id=1481762 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade xen' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |