You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa xen

Sigurnosni nedostaci programskog paketa xen

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-75063477ca
2016-04-30 18:26:33.984883
——————————————————————————–

Name : xen
Product : Fedora 22
Version : 4.5.3
Release : 2.fc22
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

x86 shadow pagetables: address width overflow [XSA-173, CVE-2016-3960] Qemu:
net: buffer overflow in stellaris_enet emulator [CVE-2016-4001] Qemu: net:
buffer overflow in MIPSnet emulator [CVE-2016-4002] qemu: Infinite loop
vulnerability in usb_ehci using siTD process [CVE-2016-4037]
——————————————————————————–
References:

[ 1 ] Bug #1323955 – CVE-2016-3960 xsa173 xen: x86 shadow pagetables: address width overflow (XSA-173)
https://bugzilla.redhat.com/show_bug.cgi?id=1323955
[ 2 ] Bug #1325884 – CVE-2016-4001 Qemu: net: buffer overflow in stellaris_enet emulator
https://bugzilla.redhat.com/show_bug.cgi?id=1325884
[ 3 ] Bug #1326082 – CVE-2016-4002 Qemu: net: buffer overflow in MIPSnet emulator
https://bugzilla.redhat.com/show_bug.cgi?id=1326082
[ 4 ] Bug #1325129 – CVE-2016-4037 Qemu: usb: Infinite loop vulnerability in usb_ehci using siTD process
https://bugzilla.redhat.com/show_bug.cgi?id=1325129
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update xen’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

——————————————————————————–
Fedora Update Notification
FEDORA-2016-35d7b09908
2016-04-29 19:05:02.694481
——————————————————————————–

Name : xen
Product : Fedora 23
Version : 4.5.3
Release : 2.fc23
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

x86 shadow pagetables: address width overflow [XSA-173, CVE-2016-3960] Qemu:
net: buffer overflow in stellaris_enet emulator [CVE-2016-4001] Qemu: net:
buffer overflow in MIPSnet emulator [CVE-2016-4002] qemu: Infinite loop
vulnerability in usb_ehci using siTD process [CVE-2016-4037]
——————————————————————————–
References:

[ 1 ] Bug #1323955 – CVE-2016-3960 xsa173 xen: x86 shadow pagetables: address width overflow (XSA-173)
https://bugzilla.redhat.com/show_bug.cgi?id=1323955
[ 2 ] Bug #1325884 – CVE-2016-4001 Qemu: net: buffer overflow in stellaris_enet emulator
https://bugzilla.redhat.com/show_bug.cgi?id=1325884
[ 3 ] Bug #1326082 – CVE-2016-4002 Qemu: net: buffer overflow in MIPSnet emulator
https://bugzilla.redhat.com/show_bug.cgi?id=1326082
[ 4 ] Bug #1325129 – CVE-2016-4037 Qemu: usb: Infinite loop vulnerability in usb_ehci using siTD process
https://bugzilla.redhat.com/show_bug.cgi?id=1325129
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update xen’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

AutorMarko Stanec
Cert idNCERT-REF-2016-05-0007-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa firefox

Otkriveni su sigurnosni nedostaci u programskom paketu firefox za operacijski sustav Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close