You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa xen

Sigurnosni nedostaci programskog paketa xen

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2017-d4709b0d8b
2017-11-01 15:19:51.800150
——————————————————————————–

Name : xen
Product : Fedora 25
Version : 4.7.3
Release : 7.fc25
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

xen: various flaws (#1501391) multiple MSI mapping issues on x86 [XSA-237] DMOP
map/unmap missing argument checks [XSA-238] hypervisor stack leak in x86 I/O
intercept code [XSA-239] Unlimited recursion in linear pagetable de-typing
[XSA-240] Stale TLB entry due to page type release race [XSA-241] page type
reference leak on x86 [XSA-242] x86: Incorrect handling of self-linear shadow
mappings with translated guests [XSA-243] x86: Incorrect handling of IST
settings during CPU hotplug [XSA-244] —- ARM: Some memory not scrubbed at
boot [XSA-245] Qemu: vga: reachable assert failure during during display update
[CVE-2017-13673] (#1486591) Qemu: vga: OOB read access during display update
[CVE-2017-13672] (#1486562)
——————————————————————————–
References:

[ 1 ] Bug #1499817 – CVE-2017-15590 xsa237 xen: multiple MSI mapping issues on x86 (XSA-237)
https://bugzilla.redhat.com/show_bug.cgi?id=1499817
[ 2 ] Bug #1499818 – CVE-2017-15591 xsa238 xen: DMOP map/unmap missing argument checks (XSA-238)
https://bugzilla.redhat.com/show_bug.cgi?id=1499818
[ 3 ] Bug #1499819 – CVE-2017-15589 xsa239 xen: hypervisor stack leak in x86 I/O intercept code (XSA-239)
https://bugzilla.redhat.com/show_bug.cgi?id=1499819
[ 4 ] Bug #1499820 – CVE-2017-15595 xsa240 xen: Unlimited recursion in linear pagetable de-typing (XSA-240)
https://bugzilla.redhat.com/show_bug.cgi?id=1499820
[ 5 ] Bug #1499821 – CVE-2017-15588 xsa241 xen: Stale TLB entry due to page type release race (XSA-241)
https://bugzilla.redhat.com/show_bug.cgi?id=1499821
[ 6 ] Bug #1499822 – CVE-2017-15593 xsa242 xen: page type reference leak on x86 (XSA-242)
https://bugzilla.redhat.com/show_bug.cgi?id=1499822
[ 7 ] Bug #1499823 – CVE-2017-15592 xsa243 xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243)
https://bugzilla.redhat.com/show_bug.cgi?id=1499823
[ 8 ] Bug #1499824 – CVE-2017-15594 xsa244 xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244)
https://bugzilla.redhat.com/show_bug.cgi?id=1499824
[ 9 ] Bug #1499825 – xsa245 xen: ARM: Some memory not scrubbed at boot (XSA-245)
https://bugzilla.redhat.com/show_bug.cgi?id=1499825
[ 10 ] Bug #1486588 – CVE-2017-13673 Qemu: vga: reachable assert failure during during display update
https://bugzilla.redhat.com/show_bug.cgi?id=1486588
[ 11 ] Bug #1486560 – CVE-2017-13672 Qemu: vga: OOB read access during display update
https://bugzilla.redhat.com/show_bug.cgi?id=1486560
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade xen’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2017-5bcddc1984
2017-10-31 23:12:40.425783
——————————————————————————–

Name : xen
Product : Fedora 26
Version : 4.8.2
Release : 4.fc26
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

xen: various flaws (#1501391) multiple MSI mapping issues on x86 [XSA-237] DMOP
map/unmap missing argument checks [XSA-238] hypervisor stack leak in x86 I/O
intercept code [XSA-239] Unlimited recursion in linear pagetable de-typing
[XSA-240] Stale TLB entry due to page type release race [XSA-241] page type
reference leak on x86 [XSA-242] x86: Incorrect handling of self-linear shadow
mappings with translated guests [XSA-243] x86: Incorrect handling of IST
settings during CPU hotplug [XSA-244] —- ARM: Some memory not scrubbed at
boot [XSA-245] Qemu: vga: reachable assert failure during during display update
[CVE-2017-13673] (#1486591) Qemu: vga: OOB read access during display update
[CVE-2017-13672] (#1486562)
——————————————————————————–
References:

[ 1 ] Bug #1499817 – CVE-2017-15590 xsa237 xen: multiple MSI mapping issues on x86 (XSA-237)
https://bugzilla.redhat.com/show_bug.cgi?id=1499817
[ 2 ] Bug #1499818 – CVE-2017-15591 xsa238 xen: DMOP map/unmap missing argument checks (XSA-238)
https://bugzilla.redhat.com/show_bug.cgi?id=1499818
[ 3 ] Bug #1499819 – CVE-2017-15589 xsa239 xen: hypervisor stack leak in x86 I/O intercept code (XSA-239)
https://bugzilla.redhat.com/show_bug.cgi?id=1499819
[ 4 ] Bug #1499820 – CVE-2017-15595 xsa240 xen: Unlimited recursion in linear pagetable de-typing (XSA-240)
https://bugzilla.redhat.com/show_bug.cgi?id=1499820
[ 5 ] Bug #1499821 – CVE-2017-15588 xsa241 xen: Stale TLB entry due to page type release race (XSA-241)
https://bugzilla.redhat.com/show_bug.cgi?id=1499821
[ 6 ] Bug #1499822 – CVE-2017-15593 xsa242 xen: page type reference leak on x86 (XSA-242)
https://bugzilla.redhat.com/show_bug.cgi?id=1499822
[ 7 ] Bug #1499823 – CVE-2017-15592 xsa243 xen: x86: Incorrect handling of self-linear shadow mappings with translated guests (XSA-243)
https://bugzilla.redhat.com/show_bug.cgi?id=1499823
[ 8 ] Bug #1499824 – CVE-2017-15594 xsa244 xen: x86: Incorrect handling of IST settings during CPU hotplug (XSA-244)
https://bugzilla.redhat.com/show_bug.cgi?id=1499824
[ 9 ] Bug #1499825 – xsa245 xen: ARM: Some memory not scrubbed at boot (XSA-245)
https://bugzilla.redhat.com/show_bug.cgi?id=1499825
[ 10 ] Bug #1486588 – CVE-2017-13673 Qemu: vga: reachable assert failure during during display update
https://bugzilla.redhat.com/show_bug.cgi?id=1486588
[ 11 ] Bug #1486560 – CVE-2017-13672 Qemu: vga: OOB read access during display update
https://bugzilla.redhat.com/show_bug.cgi?id=1486560
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade xen’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

AutorVlatka Misic
Cert idNCERT-REF-2017-11-0009-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa iTunes

Otkriveni su sigurnosni nedostaci u programskom paketu iTunes za operacijski sustav Windows. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close