You are here
Home > Preporuke > Višestruke ranjivosti programskog paketa xen

Višestruke ranjivosti programskog paketa xen

  • Detalji os-a: FED
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2015-a931b02be2
2015-11-08 21:07:00.318057
——————————————————————————–

Name : xen
Product : Fedora 23
Version : 4.5.1
Release : 14.fc23
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

nine security updates CVE-2015-7969 CVE-2015-7970 CVE-2015-7813 CVE-2015-7814
CVE-2015-7812 CVE-2015-7971 CVE-2015-7835 CVE-2015-7972
——————————————————————————–
References:

[ 1 ] Bug #1272519 – CVE-2015-7969 xen: leak of main per-domain vcpu pointer array
https://bugzilla.redhat.com/show_bug.cgi?id=1272519
[ 2 ] Bug #1272529 – CVE-2015-7970 xen: Long latency populate-on-demand operation is not preemptible on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1272529
[ 3 ] Bug #1271626 – CVE-2015-7813 xen: Various unimplemented hypercalls log without rate limiting on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271626
[ 4 ] Bug #1271630 – CVE-2015-7814 xen: Race between domain destruction and memory allocation decrease on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271630
[ 5 ] Bug #1271621 – CVE-2015-7812 xen: Host crash when preempting a multicall on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271621
[ 6 ] Bug #1272525 – CVE-2015-7971 xen: Some pmu and profiling hypercalls log without rate limiting on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1272525
[ 7 ] Bug #1271971 – CVE-2015-7835 xen: Uncontrolled creation of large page mappings by PV guests on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1271971
[ 8 ] Bug #1276120 – CVE-2015-7972 xen: populate-on-demand balloon size inaccuracy can crash guests on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1276120
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update xen’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-6f6b79efe2
2015-11-09 20:15:33.214380
——————————————————————————–

Name : xen
Product : Fedora 22
Version : 4.5.1
Release : 14.fc22
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

nine security updates CVE-2015-7969 CVE-2015-7970 CVE-2015-7813 CVE-2015-7814
CVE-2015-7812 CVE-2015-7971 CVE-2015-7835 CVE-2015-7972
——————————————————————————–
References:

[ 1 ] Bug #1272519 – CVE-2015-7969 xen: leak of main per-domain vcpu pointer array
https://bugzilla.redhat.com/show_bug.cgi?id=1272519
[ 2 ] Bug #1272529 – CVE-2015-7970 xen: Long latency populate-on-demand operation is not preemptible on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1272529
[ 3 ] Bug #1271626 – CVE-2015-7813 xen: Various unimplemented hypercalls log without rate limiting on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271626
[ 4 ] Bug #1271630 – CVE-2015-7814 xen: Race between domain destruction and memory allocation decrease on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271630
[ 5 ] Bug #1271621 – CVE-2015-7812 xen: Host crash when preempting a multicall on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271621
[ 6 ] Bug #1272525 – CVE-2015-7971 xen: Some pmu and profiling hypercalls log without rate limiting on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1272525
[ 7 ] Bug #1271971 – CVE-2015-7835 xen: Uncontrolled creation of large page mappings by PV guests on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1271971
[ 8 ] Bug #1276120 – CVE-2015-7972 xen: populate-on-demand balloon size inaccuracy can crash guests on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1276120
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update xen’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2015-242be2c240
2015-11-09 20:14:23.881275
——————————————————————————–

Name : xen
Product : Fedora 21
Version : 4.4.3
Release : 7.fc21
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

nine security updates CVE-2015-7969 CVE-2015-7970 CVE-2015-7813 CVE-2015-7814
CVE-2015-7812 CVE-2015-7971 CVE-2015-7835 CVE-2015-7972
——————————————————————————–
References:

[ 1 ] Bug #1272519 – CVE-2015-7969 xen: leak of main per-domain vcpu pointer array
https://bugzilla.redhat.com/show_bug.cgi?id=1272519
[ 2 ] Bug #1272529 – CVE-2015-7970 xen: Long latency populate-on-demand operation is not preemptible on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1272529
[ 3 ] Bug #1271626 – CVE-2015-7813 xen: Various unimplemented hypercalls log without rate limiting on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271626
[ 4 ] Bug #1271630 – CVE-2015-7814 xen: Race between domain destruction and memory allocation decrease on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271630
[ 5 ] Bug #1271621 – CVE-2015-7812 xen: Host crash when preempting a multicall on ARM
https://bugzilla.redhat.com/show_bug.cgi?id=1271621
[ 6 ] Bug #1272525 – CVE-2015-7971 xen: Some pmu and profiling hypercalls log without rate limiting on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1272525
[ 7 ] Bug #1271971 – CVE-2015-7835 xen: Uncontrolled creation of large page mappings by PV guests on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1271971
[ 8 ] Bug #1276120 – CVE-2015-7972 xen: populate-on-demand balloon size inaccuracy can crash guests on x86
https://bugzilla.redhat.com/show_bug.cgi?id=1276120
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update xen’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce
7e

AutorTomislav Protega
Cert idNCERT-REF-2015-11-0002-ADV
CveCVE-2015-7969 CVE-2015-7970 CVE-2015-7813 CVE-2015-7814 CVE-2015-7812 CVE-2015-7971 CVE-2015-7835 CVE-2015-7972
ID izvornikaFEDORA-2015-242
Proizvodxen
Izvorhttp://www.redhat.com
Top
More in Preporuke
Ranjivosti jezgre operacijskog sustava

Otkrivene su četiri ranjivosti u jezgri operacijskog sustava Debian. Ranjivosti zahvaćaju implementaciju KVM hypervisora, pogonski program usbvision, keyrings garbage kolektor...

Close