Name : xen Product : Fedora 17 Version : 4.1.5 Release : 2.fc17 URL : http://xen.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor
------------------------------------------------------------------------------- - Update Information:
PV guests can use non-preemptible long latency operations to mount a denial of service attack on the whole system [XSA-45, CVE-2013-1918], malicious guests can inject interrupts through bridge devices to mount a denial of service attack on the whole system [XSA-49, CVE-2013-1952] ------------------------------------------------------------------------------- - ChangeLog:
* Thu May 2 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-2 - PV guests can use non-preemptible long latency operations to mount a denial of service attack on the whole system [XSA-45, CVE-2013-1918] (#958918) - malicious guests can inject interrupts through bridge devices to mount a denial of service attack on the whole system [XSA-49, CVE-2013-1952] (#958919) * Thu Apr 25 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.5-1 - update to xen-4.1.5 includes fixes for passed through IRQs or PCI devices might allow denial of service attack [XSA-46, CVE-2013-1919] (#953568) SYSENTER in 32-bit PV guests on 64-bit xen can crash hypervisor [XSA-44, CVE-2013-1917] (#953569) grant releases can release more than intended potentially crashing xen [XSA-50, CVE-2013-1964] (#953632) - remove patches that are included in 4.1.5 - allow xendomains to work with xl saved images * Thu Apr 4 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-7 - make xendomains systemd script executable (#919705) - Potential use of freed memory in event channel operations [XSA-47, CVE-2013-1920] * Fri Feb 22 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-6 - patch for [XSA-36, CVE-2013-0153] can cause boot time crash - backport the fixes discovered when building with gcc 4.8 * Fri Feb 15 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-5 - patch for [XSA-38, CVE-2013-0215] was flawed * Wed Feb 6 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-4 - guest using oxenstored can crash host or exhaust memory [XSA-38, CVE-2013-0215] (#907888) - guest using AMD-Vi for PCI passthrough can cause denial of service [XSA-36, CVE-2013-0153] (#910914) * Thu Jan 17 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-3 - Buffer overflow when processing large packets in qemu e1000 device driver [XSA-41, CVE-2012-6075] (#910845) - fix a bug introduced by fix for XSA-27 * Fri Jan 11 2013 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-2 - VT-d interrupt remapping source validation flaw [XSA-33, CVE-2012-5634] (#893568) * Tue Dec 18 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.4-1 - update to xen-4.1.4 - remove patches that are included in 4.1.4 * Tue Dec 4 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-7 - 6 security fixes A guest can cause xen to crash [XSA-26, CVE-2012-5510] (#883082) An HVM guest can cause xen to run slowly or crash [XSA-27, CVE-2012-5511] (#883084) An HVM guest can cause xen to crash or leak information [XSA-28, CVE-2012-5512] (#883085) A PV guest can cause xen to crash and might be able escalate privileges [XSA-29, CVE-2012-5513] (#883088) An HVM guest can cause xen to hang [XSA-30, CVE-2012-5514] (#883091) A guest can cause xen to hang [XSA-31, CVE-2012-5515] (#883092) * Tue Nov 13 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-6 - 5 security fixes A guest can block a cpu by setting a bad VCPU deadline [XSA 20, CVE-2012-4535] (#876198) HVM guest can use invalid pirq values to crash xen [XSA 21, CVE-2012-4536] (#876200) HVM guest can exhaust p2m table crashing xen [XSA 22, CVE-2012-4537] (#876203) PAE HVM guest can crash hypervisor [XSA-23, CVE-2012-4538] (#876205) 32-bit PV guest on 64-bit hypervisor can cause an hypervisor infinite loop [XSA-24, CVE-2012-4539] (#876207) * Sun Oct 28 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-5 - limit the size of guest kernels and ramdisks to avoid running out of memory on dom0 during guest boot [XSA-25, CVE-2012-4544] (#870414) - remove pygrub.size.limits.patch patch included in new patch * Thu Sep 6 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-4 - disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141) * Wed Sep 5 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-3 - 5 security fixes a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494] (#854585) a malicious crash might be able to crash the dom0 or escalate privileges [XSA-13, CVE-2012-3495] (#854589) a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590) a malicious HVM guest can crash the dom0 and might be able to read hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593) an HVM guest could use VT100 escape sequences to escalate privileges to that of the qemu process [XSA-17, CVE-2012-3515] (#854599) * Fri Aug 10 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.3-1 4.1.3-2 - update to 4.1.3 includes fix for untrusted HVM guest can cause the dom0 to hang or crash [XSA-11, CVE-2012-3433] (#843582) - remove patches that are now upstream - remove some unnecessary compile fixes - adjust upstream-23936:cdb34816a40a-rework for backported fix for upstream-23940:187d59e32a58 - replace pygrub.size.limits.patch with upstreamed version - fix for (#845444) broke xend under systemd * Tue Aug 7 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-25 - remove some unnecessary cache flushing that slow things down - change python options on xend to reduce selinux problems (#845444) * Thu Jul 26 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-24 - in rare circumstances an unprivileged user can crash an HVM guest [XSA-10,CVE-2012-3432] (#843766) * Tue Jul 24 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-23 - add a patch to remove a dependency on PyXML and Require python-lxml instead of PyXML (#842843) * Sun Jul 22 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-22 - adjust systemd service files not to report failures when running without a hypervisor or when xendomains.service doesn't find anything to start * Sun Jul 22 2012 Fedora Release Engineering <rel-eng@lists.fedoraproject.org> - 4.1.2-21 - Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild * Tue Jun 12 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-20 - Apply three security patches 64-bit PV guest privilege escalation vulnerability [CVE-2012-0217] guest denial of service on syscall/sysenter exception generation [CVE-2012-0218] PV guest host Denial of Service [CVE-2012-2934] * Sat Jun 9 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-19 - adjust xend.service systemd file to avoid selinux problems * Fri Jun 8 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-18 - Enable xenconsoled by default under systemd (#829732) * Thu May 17 2012 Michael Young <m.a.young@durham.ac.uk> - 4.1.2-16 4.1.2-17 - make pygrub cope better with big files from guest (#818412 CVE-2012-2625) - add patch from 4.1.3-rc2-pre to build on F17/8 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #956163 - CVE-2013-1918 kernel: xen: Several long latency operations are not preemptible https://bugzilla.redhat.com/show_bug.cgi?id=956163 [ 2 ] Bug #956309 - CVE-2013-1952 kernel: xen: VT-d interrupt remapping source validation flaw for bridges https://bugzilla.redhat.com/show_bug.cgi?id=956309 ------------------------------------------------------------------------------- -
This update can be installed with the "yum" update program. Use su -c 'yum update xen' at the command line. For more information, refer to "Managing Software with yum", available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - _______________________________________________ package-announce mailing list package-announce@lists.fedoraproject.org https://admin.fedoraproject.org/mailman/listinfo/package-announce
|