drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in Xen
Name: |
Denial of Service in Xen |
|
ID: |
FEDORA-2013-4952 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 18 |
|
Datum: |
So, 14. April 2013, 20:39 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920 |
|
Applikationen: |
Xen |
|
Originalnachricht |
Name : xen Product : Fedora 18 Version : 4.2.1 Release : 10.fc18 URL : http://xen.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor
------------------------------------------------------------------------------- - Update Information:
make xendomains systemd script executable and update it from init.d version (#919705), Potential use of freed memory in event channel operations [XSA-47, CVE-2013-1920] ------------------------------------------------------------------------------- - ChangeLog:
* Thu Apr 4 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-10 - make xendomains systemd script executable and update it from init.d version (#919705) - Potential use of freed memory in event channel operations [XSA-47, CVE-2013-1920] * Thu Feb 21 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-9 - patch for [XSA-36, CVE-2013-0153] can cause boot time crash * Fri Feb 15 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-8 - patch for [XSA-38, CVE-2013-0215] was flawed * Fri Feb 8 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-7 - BuildRequires for texlive-kpathsea-bin wasn't needed - correct gcc 4.8 fixes and follow suggestions upstream * Tue Feb 5 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-6 - guest using oxenstored can crash host or exhaust memory [XSA-38, CVE-2013-0215] (#907888) - guest using AMD-Vi for PCI passthrough can cause denial of service [XSA-36, CVE-2013-0153] (#910914) - add some fixes for code which gcc 4.8 complains about - additional BuildRequires are now needed for pod2text and pod2man also texlive-kpathsea-bin for mktexfmt * Wed Jan 23 2013 Michael Young <m.a.young@durham.ac.uk> - correct disabling of xendomains.service on uninstall * Tue Jan 22 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-5 - nested virtualization on 32-bit guest can crash host [XSA-34, CVE-2013-0151] also nested HVM on guest can cause host to run out of memory [XSA-35, CVE-2013-0152] (#902792) - restore status option to xend which is used by libvirt (#893699) * Thu Jan 17 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-4 - Buffer overflow when processing large packets in qemu e1000 device driver [XSA-41, CVE-2012-6075] (#910845) * Thu Jan 10 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-3 - fix some format errors in xl.cfg.pod.5 to allow build on F19 * Wed Jan 9 2013 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-2 - VT-d interrupt remapping source validation flaw [XSA-33, CVE-2012-5634] (#893568) - pv guests can crash xen when xen built with debug=y (included for completeness - Fedora builds have debug=n) [XSA-37, CVE-2013-0154] * Tue Dec 18 2012 Michael Young <m.a.young@durham.ac.uk> - 4.2.1-1 - update to xen-4.2.1 - remove patches that are included in 4.2.1 - rebase xen.fedora.efi.build.patch * Thu Dec 13 2012 Richard W.M. Jones <rjones@redhat.com> - 4.2.0-7 - Rebuild for OCaml fix (RHBZ#877128). ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #919705 - /usr/libexec/xendomains is not executable https://bugzilla.redhat.com/show_bug.cgi?id=919705 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update xen' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|
|
|
|