Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: FEDORA-2017-d4ee7018c1
Distribution: Fedora
Plattformen: Fedora 24
Datum: So, 26. Februar 2017, 12:45
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2615
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5525
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-9776
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-5526
https://bugzilla.redhat.com/show_bug.cgi?id=1418277
Applikationen: Xen

Originalnachricht

Name        : xen
Product : Fedora 24
Version : 4.6.4
Release : 7.fc24
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

-------------------------------------------------------------------------------
-
Update Information:

memory leak when destroying guest without PT devices [XSA-207] (#1422492)
update
patches for XSA-208 after upstream revision (no functional change) ---- Qemu:
net: mcf_fec: infinite loop while receiving data in mcf_fec_receive
[CVE-2016-9776] Qemu: audio: memory leakage in ac97 [CVE-2017-5525] (#1414111)
Qemu: audio: memory leakage in es1370 device [CVE-2017-5526] (#1414211) oob
access in cirrus bitblt copy [XSA-208, CVE-2017-2615] (#1418243)
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #1418277 - xsa207 xen: memory leak when destroying guest without PT
devices (XSA-207)
https://bugzilla.redhat.com/show_bug.cgi?id=1418277
[ 2 ] Bug #1414108 - CVE-2017-5525 Qemu: audio: memory leakage in ac97 device
https://bugzilla.redhat.com/show_bug.cgi?id=1414108
[ 3 ] Bug #1414209 - CVE-2017-5526 Qemu: audio: memory leakage in es1370
device
https://bugzilla.redhat.com/show_bug.cgi?id=1414209
[ 4 ] Bug #1418200 - CVE-2017-2615 Qemu: display: cirrus: oob access while
doing bitblt copy backward mode
https://bugzilla.redhat.com/show_bug.cgi?id=1418200
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade xen' at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung