Mehrere Probleme in Xen
ID: | FEDORA-2017-16a414b3c5 |
Distribution: | Fedora |
Plattformen: | Fedora 26 |
Datum: | Di, 2. Januar 2018, 23:01 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17566
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17565 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17045 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17563 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15595 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17564 |
Applikationen: | Xen |
Originalnachricht |
|
-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2017-16a414b3c5 2018-01-02 14:44:38.578556 -------------------------------------------------------------------------------- Name : xen Product : Fedora 26 Version : 4.8.2 Release : 9.fc26 URL : http://xen.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor -------------------------------------------------------------------------------- Update Information: another patch related to the [XSA-240, CVE-2017-15595] issue xen: various flaws (#1525018) x86 PV guests may gain access to internally used page [XSA-248] broken x86 shadow mode refcount overflow check [XSA-249] improper x86 shadow mode refcount error handling [XSA-250] improper bug check in x86 log-dirty handling [XSA-251] ---- xen: various flaws (#1518214) x86: infinite loop due to missing PoD error checking [XSA-246] Missing p2m error checking in PoD code [XSA-247] -------------------------------------------------------------------------------- References: [ 1 ] Bug #1518656 - CVE-2017-17566 xsa248 xen: x86 PV guests may gain access to internally used pages (XSA-248) https://bugzilla.redhat.com/show_bug.cgi?id=1518656 [ 2 ] Bug #1518657 - CVE-2017-17563 xsa249 xen: broken x86 shadow mode refcount overflow check (XSA-249) https://bugzilla.redhat.com/show_bug.cgi?id=1518657 [ 3 ] Bug #1518658 - CVE-2017-17564 xsa250 xen: improper x86 shadow mode refcount error handling (XSA-250) https://bugzilla.redhat.com/show_bug.cgi?id=1518658 [ 4 ] Bug #1518659 - CVE-2017-17565 xsa251 xen: improper bug check in x86 log-dirty handling (XSA-251) https://bugzilla.redhat.com/show_bug.cgi?id=1518659 [ 5 ] Bug #1513335 - CVE-2017-17044 xsa246 xen: x86: infinite loop due to missing PoD error checking (XSA-246) https://bugzilla.redhat.com/show_bug.cgi?id=1513335 [ 6 ] Bug #1513336 - CVE-2017-17045 xsa247 xen: Missing p2m error checking in PoD code (XSA-247) https://bugzilla.redhat.com/show_bug.cgi?id=1513336 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade xen' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org |