Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Xen
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Xen
ID: FEDORA-2013-11871
Distribution: Fedora
Plattformen: Fedora 17
Datum: So, 7. Juli 2013, 11:46
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0217
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0218
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2625
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2934
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3433
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3494
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3495
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3496
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3498
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3515
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4411
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4535
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4536
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4537
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4538
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4539
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-4544
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5511
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5512
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5513
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5514
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5515
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5634
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6075
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0153
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0215
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1432
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1917
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1918
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1919
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1920
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1952
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1964
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2072
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2076
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2077
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2078
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2194
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2195
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2196
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2211
Applikationen: Xen

Originalnachricht

Name        : xen
Product : Fedora 17
Version : 4.1.5
Release : 9.fc17
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

-------------------------------------------------------------------------------
-
Update Information:

XSA-45/CVE-2013-1918 breaks page reference counting
let pygrub handle set default="${next_entry}" line in F19
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Jun 26 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-9
- XSA-45/CVE-2013-1918 breaks page reference counting [XSA-58,
CVE-2013-1432] (#978383)
- let pygrub handle set default="${next_entry}" line in F19 (#978036)
* Mon Jun 24 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-8
- add upstream patch for PCI passthrough problems after XSA-46
* Fri Jun 21 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-7
- xenstore permissions not set correctly by libxl [XSA-57,
CVE-2013-2211] (#976779)
* Fri Jun 14 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-6
- Revised fixes for [XSA-55, CVE-2013-2194 CVE-2013-2195
CVE-2013-2196] (#970640)
* Wed Jun 5 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-5
- Information leak on XSAVE/XRSTOR capable AMD CPUs
[XSA-52, CVE-2013-2076] (#970206)
- Hypervisor crash due to missing exception recovery on XRSTOR
[XSA-53, CVE-2013-2077] (#970204)
- Hypervisor crash due to missing exception recovery on XSETBV
[XSA-54, CVE-2013-2078] (#970202)
- Multiple vulnerabilities in libelf PV kernel handling
[XSA-55] (#970640)
* Fri May 17 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-4
- xend toolstack doesn't check bounds for VCPU affinity
[XSA-56, CVE-2013-2072] (#964241)
* Wed May 15 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-3
- xen-devel should require libuuid-devel (#962833)
- pygrub menu items can include too much text (#958524)
* Thu May 2 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-2
- PV guests can use non-preemptible long latency operations to
mount a denial of service attack on the whole system
[XSA-45, CVE-2013-1918] (#958918)
- malicious guests can inject interrupts through bridge devices to
mount a denial of service attack on the whole system
[XSA-49, CVE-2013-1952] (#958919)
* Thu Apr 25 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-1
- update to xen-4.1.5
includes fixes for
passed through IRQs or PCI devices might allow denial of service attack
[XSA-46, CVE-2013-1919] (#953568)
SYSENTER in 32-bit PV guests on 64-bit xen can crash hypervisor
[XSA-44, CVE-2013-1917] (#953569)
grant releases can release more than intended potentially crashing xen
[XSA-50, CVE-2013-1964] (#953632)
- remove patches that are included in 4.1.5
- allow xendomains to work with xl saved images
* Thu Apr 4 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-7
- make xendomains systemd script executable (#919705)
- Potential use of freed memory in event channel operations [XSA-47,
CVE-2013-1920]
* Fri Feb 22 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-6
- patch for [XSA-36, CVE-2013-0153] can cause boot time crash
- backport the fixes discovered when building with gcc 4.8
* Fri Feb 15 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-5
- patch for [XSA-38, CVE-2013-0215] was flawed
* Wed Feb 6 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-4
- guest using oxenstored can crash host or exhaust memory [XSA-38,
CVE-2013-0215] (#907888)
- guest using AMD-Vi for PCI passthrough can cause denial of service
[XSA-36, CVE-2013-0153] (#910914)
* Thu Jan 17 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-3
- Buffer overflow when processing large packets in qemu e1000 device
driver [XSA-41, CVE-2012-6075] (#910845)
- fix a bug introduced by fix for XSA-27
* Fri Jan 11 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-2
- VT-d interrupt remapping source validation flaw [XSA-33,
CVE-2012-5634] (#893568)
* Tue Dec 18 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-1
- update to xen-4.1.4
- remove patches that are included in 4.1.4
* Tue Dec 4 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-7
- 6 security fixes
A guest can cause xen to crash [XSA-26, CVE-2012-5510] (#883082)
An HVM guest can cause xen to run slowly or crash [XSA-27, CVE-2012-5511]
(#883084)
An HVM guest can cause xen to crash or leak information [XSA-28,
CVE-2012-5512] (#883085)
A PV guest can cause xen to crash and might be able escalate privileges
[XSA-29, CVE-2012-5513] (#883088)
An HVM guest can cause xen to hang [XSA-30, CVE-2012-5514] (#883091)
A guest can cause xen to hang [XSA-31, CVE-2012-5515] (#883092)
* Tue Nov 13 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-6
- 5 security fixes
A guest can block a cpu by setting a bad VCPU deadline [XSA 20,
CVE-2012-4535] (#876198)
HVM guest can use invalid pirq values to crash xen [XSA 21, CVE-2012-4536]
(#876200)
HVM guest can exhaust p2m table crashing xen [XSA 22, CVE-2012-4537]
(#876203)
PAE HVM guest can crash hypervisor [XSA-23, CVE-2012-4538] (#876205)
32-bit PV guest on 64-bit hypervisor can cause an hypervisor infinite
loop [XSA-24, CVE-2012-4539] (#876207)
* Sun Oct 28 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-5
- limit the size of guest kernels and ramdisks to avoid running out
of memory on dom0 during guest boot [XSA-25, CVE-2012-4544] (#870414)
- remove pygrub.size.limits.patch patch included in new patch
* Thu Sep 6 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-4
- disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)
* Wed Sep 5 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-3
- 5 security fixes
a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494]
(#854585)
a malicious crash might be able to crash the dom0 or escalate privileges
[XSA-13, CVE-2012-3495] (#854589)
a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590)
a malicious HVM guest can crash the dom0 and might be able to read
hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593)
an HVM guest could use VT100 escape sequences to escalate privileges to
that of the qemu process [XSA-17, CVE-2012-3515] (#854599)
* Fri Aug 10 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-1
4.1.3-2
- update to 4.1.3
includes fix for untrusted HVM guest can cause the dom0 to hang or
crash [XSA-11, CVE-2012-3433] (#843582)
- remove patches that are now upstream
- remove some unnecessary compile fixes
- adjust upstream-23936:cdb34816a40a-rework for backported fix for
upstream-23940:187d59e32a58
- replace pygrub.size.limits.patch with upstreamed version
- fix for (#845444) broke xend under systemd
* Tue Aug 7 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-25
- remove some unnecessary cache flushing that slow things down
- change python options on xend to reduce selinux problems (#845444)
* Thu Jul 26 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-24
- in rare circumstances an unprivileged user can crash an HVM guest
[XSA-10,CVE-2012-3432] (#843766)
* Tue Jul 24 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-23
- add a patch to remove a dependency on PyXML and Require python-lxml
instead of PyXML (#842843)
* Sun Jul 22 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-22
- adjust systemd service files not to report failures when running without
a hypervisor or when xendomains.service doesn't find anything to start
* Sun Jul 22 2012 Fedora Release Engineering
<rel-eng@lists.fedoraproject.org> - 4.1.2-21
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
* Tue Jun 12 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-20
- Apply three security patches
64-bit PV guest privilege escalation vulnerability [CVE-2012-0217]
guest denial of service on syscall/sysenter exception generation
[CVE-2012-0218]
PV guest host Denial of Service [CVE-2012-2934]
* Sat Jun 9 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-19
- adjust xend.service systemd file to avoid selinux problems
* Fri Jun 8 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-18
- Enable xenconsoled by default under systemd (#829732)
* Thu May 17 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-16
4.1.2-17
- make pygrub cope better with big files from guest (#818412 CVE-2012-2625)
- add patch from 4.1.3-rc2-pre to build on F17/8
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #974250 - CVE-2013-1432 kernel: xen: Page reference counting error
due to XSA-45/CVE-2013-1918 fixes
https://bugzilla.redhat.com/show_bug.cgi?id=974250
-------------------------------------------------------------------------------
-

This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung