Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: FEDORA-2016-2c15b72b01
Distribution: Fedora
Plattformen: Fedora 23
Datum: Do, 28. Januar 2016, 23:35
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8666
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8743
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1570
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8568
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-1571
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8745
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7549
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8567
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8744
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-8558
Applikationen: Xen

Originalnachricht

Name        : xen
Product : Fedora 23
Version : 4.5.2
Release : 7.fc23
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

-------------------------------------------------------------------------------
-
Update Information:

PV superpage functionality missing sanity checks [XSA-167, CVE-2016-1570] VMX:
intercept issue with INVLPG on non-canonical address [XSA-168, CVE-2016-1571]
Qemu: pci: null pointer dereference issue CVE-2015-7549 qemu: DoS by infinite
loop in ehci_advance_state CVE-2015-8558 qemu: Heap-based buffer overrun during
VM migration CVE-2015-8666 Qemu: net: vmxnet3: incorrect l2 header validation
leads to a crash via assert(2) call CVE-2015-8744 qemu: Support reading IMR
registers on bar0 CVE-2015-8745 Qemu: net: vmxnet3: host memory leakage
CVE-2015-8567 CVE-2015-8568 Qemu: net: ne2000: OOB memory access in ioport r/w
functions CVE-2015-8743
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1270871 - CVE-2015-8744 Qemu: net: vmxnet3: incorrect l2 header
validation leads to a crash via assert(2) call
https://bugzilla.redhat.com/show_bug.cgi?id=1270871
[ 2 ] Bug #1296539 - CVE-2016-1570 xen: PV superpage functionality missing
sanity checks
https://bugzilla.redhat.com/show_bug.cgi?id=1296539
[ 3 ] Bug #1296544 - CVE-2016-1571 xen: Intercept issue with INVLPG on
non-canonical address causing host to crash
https://bugzilla.redhat.com/show_bug.cgi?id=1296544
[ 4 ] Bug #1291137 - CVE-2015-7549 Qemu: pci: null pointer dereference issue
https://bugzilla.redhat.com/show_bug.cgi?id=1291137
[ 5 ] Bug #1277983 - CVE-2015-8558 Qemu: usb: infinite loop in
ehci_advance_state results in DoS
https://bugzilla.redhat.com/show_bug.cgi?id=1277983
[ 6 ] Bug #1283722 - CVE-2015-8666 Qemu: acpi: heap based buffer overrun
during VM migration
https://bugzilla.redhat.com/show_bug.cgi?id=1283722
[ 7 ] Bug #1270876 - CVE-2015-8745 Qemu: net: vmxnet3: reading IMR registers
leads to a crash via assert(2) call
https://bugzilla.redhat.com/show_bug.cgi?id=1270876
[ 8 ] Bug #1289816 - CVE-2015-8568 CVE-2015-8567 Qemu: net: vmxnet3: host
memory leakage
https://bugzilla.redhat.com/show_bug.cgi?id=1289816
[ 9 ] Bug #1264929 - CVE-2015-8743 Qemu: net: ne2000: OOB memory access in
ioport r/w functions
https://bugzilla.redhat.com/show_bug.cgi?id=1264929
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung