You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa xen

Sigurnosni nedostaci programskog paketa xen

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-8fd9019541
2016-05-28 18:32:24.254848
——————————————————————————–

Name : xen
Product : Fedora 22
Version : 4.5.3
Release : 5.fc22
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

in systemd only try to load kernel modules that are in Fedora (#1291089) x86
software guest page walk PS bit handling flaw [XSA-176, CVE-2016-4480]
(#1332657) —- create link to /usr/bin/qemu-system-i386 from /usr/lib/xen/bin
for back compatibility and for virt-manager, cleaner fix for XSA-179 on qemu-
xen-traditional —- qemu-kvm: Integer overflow in SDL when creating too wide
screen QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks
[XSA-179, CVE-2016-3710, CVE-2016-3712]
——————————————————————————–
References:

[ 1 ] Bug #1332657 – CVE-2016-4480 xsa176 xen: x86 software guest page walk PS bit handling flaw (XSA-176)
https://bugzilla.redhat.com/show_bug.cgi?id=1332657
[ 2 ] Bug #1318727 – qemu-kvm: Integer overflow in SDL when creating too wide screen
https://bugzilla.redhat.com/show_bug.cgi?id=1318727
[ 3 ] Bug #1331401 – CVE-2016-3710 qemu: incorrect banked access bounds checking in vga module
https://bugzilla.redhat.com/show_bug.cgi?id=1331401
[ 4 ] Bug #1318712 – CVE-2016-3712 qemu-kvm: Out-of-bounds read when creating weird vga screen surface
https://bugzilla.redhat.com/show_bug.cgi?id=1318712
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update xen’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2016-19c82866bb
2016-05-28 18:32:58.612142
——————————————————————————–

Name : xen
Product : Fedora 23
Version : 4.5.3
Release : 5.fc23
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

in systemd only try to load kernel modules that are in Fedora (#1291089) x86
software guest page walk PS bit handling flaw [XSA-176, CVE-2016-4480]
(#1332657) —- create link to /usr/bin/qemu-system-i386 from /usr/lib/xen/bin
for back compatibility and for virt-manager, cleaner fix for XSA-179 on qemu-
xen-traditional
——————————————————————————–
References:

[ 1 ] Bug #1332657 – CVE-2016-4480 xsa176 xen: x86 software guest page walk PS bit handling flaw (XSA-176)
https://bugzilla.redhat.com/show_bug.cgi?id=1332657
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update xen’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org

AutorMarijo Plepelic
Cert idNCERT-REF-2016-05-0006-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa php

Otkriveni su sigurnosni nedostaci u programskom paketu php za operacijski sustav Fedora. Otkrivene nedostatke potencijalni napadači mogu iskoristiti za utjecaj...

Close