Sicherheit: Denial of Service in Xen
Aktuelle Meldungen Distributionen
Name: Denial of Service in Xen
ID: FEDORA-2013-22754
Distribution: Fedora
Plattformen: Fedora 20
Datum: Sa, 14. Dezember 2013, 10:21
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-6885
Applikationen: Xen


Name        : xen
Product : Fedora 20
Version : 4.3.1
Release : 5.fc20
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

Update Information:

HVM guest triggerable AMD CPU erratum may cause host hang
[XSA-82, CVE-2013-6885]

* Mon Dec 2 2013 Michael Young <m.a.young@durham.ac.uk> - 4.3.1-5
- HVM guest triggerable AMD CPU erratum may cause host hang
[XSA-82, CVE-2013-6885]
* Tue Nov 26 2013 Michael Young <m.a.young@durham.ac.uk> - 4.3.1-4
- Lock order reversal between page_alloc_lock and mm_rwlock
[XSA-74, CVE-2013-4553] (#1034925)
- Hypercalls exposed to privilege rings 1 and 2 of HVM guests
[XSA-76, CVE-2013-4554] (#1034923)
* Thu Nov 21 2013 Michael Young <m.a.young@durham.ac.uk> - 4.3.1-3
- Insufficient TLB flushing in VT-d (iommu) code
[XSA-78, CVE-2013-6375] (#1033149)

This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
package-announce mailing list
Pro-Linux @Facebook
Neue Nachrichten