You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa xen

Sigurnosni nedostaci programskog paketa xen

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-103752d2a9
2016-06-17 15:07:30.829599
——————————————————————————–

Name : xen
Product : Fedora 23
Version : 4.5.3
Release : 8.fc23
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO [CVE-2016-5338]
(#1343323) Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info
[CVE-2016-5337] (#1343909) —- fix for CVE-2016-2858 doesn’t build with qemu-
xen enabled Unsanitised guest input in libxl device handling code [XSA-175,
CVE-2016-4962] (#1342132) Unsanitised driver domain input in libxl device
handling [XSA-178, CVE-2016-4963] (#1342131) arm: Host crash caused by VMID
exhaust [XSA-181] (#1342530) Qemu: display: vmsvga: out-of-bounds read in
vmsvga_fifo_read_raw() routine [CVE-2016-4454] (#1340741) Qemu: display: vmsvga:
infinite loop in vmsvga_fifo_run() routine [CVE-2016-4453] (#1340746) Qemu:
scsi: esp: OOB write when using non-DMA mode in get_cmd [CVE-2016-5238]
(#1341931)
——————————————————————————–
References:

[ 1 ] Bug #1343323 – CVE-2016-5338 Qemu: scsi: esp: OOB r/w access while processing ESP_FIFO
https://bugzilla.redhat.com/show_bug.cgi?id=1343323
[ 2 ] Bug #1343909 – CVE-2016-5337 Qemu: scsi: megasas: information leakage in megasas_ctrl_get_info
https://bugzilla.redhat.com/show_bug.cgi?id=1343909
[ 3 ] Bug #1341931 – CVE-2016-5238 Qemu: scsi: esp: OOB write when using non-DMA mode in get_cmd
https://bugzilla.redhat.com/show_bug.cgi?id=1341931
[ 4 ] Bug #1335438 – CVE-2016-4962 xsa175 xen: Unsanitised guest input in libxl device handling code (XSA-175)
https://bugzilla.redhat.com/show_bug.cgi?id=1335438
[ 5 ] Bug #1335442 – CVE-2016-4963 xsa178 xen: Unsanitised driver domain input in libxl device handling (XSA-178)
https://bugzilla.redhat.com/show_bug.cgi?id=1335442
[ 6 ] Bug #1342529 – CVE-2016-5242 xsa181 xen: arm: Host crash caused by VMID exhaustion (XSA-181)
https://bugzilla.redhat.com/show_bug.cgi?id=1342529
[ 7 ] Bug #1336429 – CVE-2016-4454 Qemu: display: vmsvga: out-of-bounds read in vmsvga_fifo_read_raw() routine
https://bugzilla.redhat.com/show_bug.cgi?id=1336429
[ 8 ] Bug #1336650 – CVE-2016-4453 Qemu: display: vmsvga: infinite loop in vmsvga_fifo_run() routine
https://bugzilla.redhat.com/show_bug.cgi?id=1336650
——————————————————————————–

This update can be installed with the “yum” update program. Use
su -c ‘yum update xen’ at the command line.
For more information, refer to “Managing Software with yum”,
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://lists.fedoraproject.org/admin/lists/package-announce@lists.fedoraproject.org

AutorAndrej Sefic
Cert idNCERT-REF-2016-06-0092-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa iperf3

Otkriven je sigurnosni nedostatak u programskom paketu iperf3 za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje rušenje programskog paketa...

Close