Fedora 20: xen Security Update

    Date11 Apr 2015
    CategoryFedora
    189
    Posted ByLinuxSecurity Advisories
    Long latency MMIO mapping operations are not preemptible [XSA-125, CVE-2015-2752] Unmediated PCI command register access in qemu [XSA-126, CVE-2015-2756] Certain domctl operations may be abused to lock up the host [XSA-127, CVE-2015-2751] update to xen-4.3.4
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-5402
    2015-04-02 11:44:17
    --------------------------------------------------------------------------------
    
    Name        : xen
    Product     : Fedora 20
    Version     : 4.3.4
    Release     : 2.fc20
    URL         : http://xen.org/
    Summary     : Xen is a virtual machine monitor
    Description :
    This package contains the XenD daemon and xm command line
    tools, needed to manage virtual machines running under the
    Xen hypervisor
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Long latency MMIO mapping operations are not preemptible [XSA-125, CVE-2015-2752]
    Unmediated PCI command register access in qemu [XSA-126, CVE-2015-2756]
    Certain domctl operations may be abused to lock up the host [XSA-127, CVE-2015-2751]
    update to xen-4.3.4
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Tue Mar 31 2015 Michael Young  - 4.3.4-2
    - Long latency MMIO mapping operations are not preemptible [XSA-125,
    	CVE-2015-2752] (#1207741)
    - Unmediated PCI command register access in qemu [XSA-126,
    	CVE-2015-2756] (#1307738)
    - Certain domctl operations may be abused to lock up the host [XSA-127,
    	CVE-2015-2751] (#1207739)
    * Mon Mar 23 2015 Michael Young  - 4.3.4-1
    - update to xen-4.3.4
      remove patches for fixes that are now included
    * Thu Mar 12 2015 Michael Young  - 4.3.3-12
    - HVM qemu unexpectedly enabling emulated VGA graphics backends [XSA-119,
    	CVE-2015-2152] (#1201365)
    * Wed Mar 11 2015 Michael Young  - 4.3.3-11
    - Hypervisor memory corruption due to x86 emulator flaw [XSA-123,
    	CVE-2015-2151] (#1200398)
    * Thu Mar  5 2015 Michael Young  - 4.3.3-10
    - Information leak via internal x86 system device emulation [XSA-121,
    	CVE-2015-2044]
    - Information leak through version information hypercall [XSA-122,
    	CVE-2015-2045]
    * Tue Jan  6 2015 Michael Young  - 4.3.3-9
    - xen crash due to use after free on hvm guest teardown [XSA-116,
    	CVE-2015-0361] (#1179221)
    * Tue Dec 16 2014 Michael Young  - 4.3.3-8
    - fix xendomains issue introduced by xl migrate --debug patch
    * Mon Dec  8 2014 Michael Young  - 4.3.3-7
    - p2m lock starvation [XSA-114, CVE-2014-9065]
    - fix build with --without xsm
    * Thu Nov 27 2014 Michael Young  - 4.3.3-6
    - Excessive checking in compatibility mode hypercall argument translation
    	[XSA-111, CVE-2014-8866]
    - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor
    	[XSA-112, CVE-2014-8867]
    - fix segfaults and failures in xl migrate --debug (#1166461)
    * Thu Nov 20 2014 Michael Young  - 4.3.3-5
    - Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
    	[XSA-113, CVE-2014-9030] (#1166914)
    * Wed Nov 19 2014 Michael Young  - 4.3.3-4
    - Insufficient restrictions on certain MMU update hypercalls [XSA-109,
    	CVE-2014-8594] (#1165205)
    - Missing privilege level checks in x86 emulation of far branches [XSA-110,
    	CVE-2014-8595] (#1165204)
    - Add fix for CVE-2014-0150 to qemu-dm, though it probably isn't
    	exploitable from xen (#1086776)
    * Wed Oct  1 2014 Michael Young  - 4.3.3-3
    - Improper MSR range used for x2APIC emulation [XSA-108, CVE-2014-7188]
    	(#1148465)
    * Tue Sep 23 2014 Michael Young  - 4.3.3-2
    - Race condition in HVMOP_track_dirty_vram [XSA-104, CVE-2014-7154] (#1145736)
    - Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation
    	[XSA-105, CVE-2014-7155] (#1145737)
    - Missing privilege level checks in x86 emulation of software interrupts
    	[XSA-106, CVE-2014-7156] (#1145738)
    * Tue Sep  2 2014 Michael Young  - 4.3.3-1
    - update to xen-4.3.3
      remove patches for fixes that are now included
    * Wed Aug 13 2014 Michael Young  - 4.3.2-7
    - Long latency virtual-mmu operations are not preemptible
    	[XSA-97, CVE-2014-5146]
    * Fri Jun 20 2014 Michael Young  - 4.3.2-6
    - Hypervisor heap contents leaked to guest [XSA-100, CVE-2014-4021]
    	(#1110316) with extra patch to avoid regression
    * Sun Jun 15 2014 Michael Young  - 4.3.2-5
    - Fix %if line typo in the spec file
    - Vulnerabilities in HVM MSI injection [XSA-96, CVE-2014-3967,CVE-2014-3968]
    	(#1104583)
    * Sun May 11 2014 Michael Young  - 4.3.2-4
    - add systemd preset support (#1094938)
    * Thu May  1 2014 Michael Young  - 4.3.2-3
    - HVMOP_set_mem_type allows invalid P2M entries to be created
    	[XSA-92, CVE-2014-3124] (#1093315)
    * Wed Mar 26 2014 Michael Young  - 4.3.2-2
    - HVMOP_set_mem_access is not preemptible [XSA-89, CVE-2014-2599] (#1080425)
    * Tue Feb 18 2014 Michael Young  - 4.3.2-1
    - update to xen-4.3.2
      includes fix for "Excessive time to disable caching with HVM guests with
        PCI passthrough" [XSA-60, CVE-2013-2212] (#987914)
    - remove patches that are now included
    * Wed Feb 12 2014 Michael Young  - 4.3.1-10
    - use-after-free in xc_cpupool_getinfo() under memory pressure [XSA-88,
        CVE-2014-1950] (#1064491)
    * Thu Feb  6 2014 Michael Young  - 4.3.1-9
    - integer overflow in several XSM/Flask hypercalls [XSA-84, CVE-2014-1891,
        CVE-2014-1892, CVE-2014-1893, CVE-2014-1894]
      Off-by-one error in FLASK_AVC_CACHESTAT hypercall [XSA-85, CVE-2014-1895]
      libvchan failure handling malicious ring indexes [XSA-86, CVE-2014-1896]
        (#1062335)
    * Fri Jan 24 2014 Michael Young  - 4.3.1-8
    - PHYSDEVOP_{prepare,release}_msix exposed to unprivileged pv guests
        [XSA-87, CVE-2014-1666] (#1058398)
    * Thu Jan 23 2014 Michael Young  - 4.3.1-7
    - Out-of-memory condition yielding memory corruption during IRQ setup
        [XSA-83, CVE-2014-1642] (#1057142)
    * Wed Dec 11 2013 Michael Young  - 4.3.1-6
    - Disaggregated domain management security status update [XSA-77]
    - IOMMU TLB flushing may be inadvertently suppressed [XSA-80, CVE-2013-6400]
        (#1040024)
    * Mon Dec  2 2013 Michael Young  - 4.3.1-5
    - HVM guest triggerable AMD CPU erratum may cause host hang
        [XSA-82, CVE-2013-6885]
    * Tue Nov 26 2013 Michael Young  - 4.3.1-4
    - Lock order reversal between page_alloc_lock and mm_rwlock
        [XSA-74, CVE-2013-4553] (#1034925)
    - Hypercalls exposed to privilege rings 1 and 2 of HVM guests
        [XSA-76, CVE-2013-4554] (#1034923)
    * Thu Nov 21 2013 Michael Young  - 4.3.1-3
    - Insufficient TLB flushing in VT-d (iommu) code
        [XSA-78, CVE-2013-6375] (#1033149)
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1203737 - CVE-2015-2756 xen: unmediated PCI command register access in qemu (xsa126)
            https://bugzilla.redhat.com/show_bug.cgi?id=1203737
      [ 2 ] Bug #1203732 - CVE-2015-2752 xen: long latency MMIO mapping operations are not preemptible (xsa125)
            https://bugzilla.redhat.com/show_bug.cgi?id=1203732
      [ 3 ] Bug #1203745 - CVE-2015-2751 xen: certain domctl operations may be abused to lock up the host
            https://bugzilla.redhat.com/show_bug.cgi?id=1203745
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update xen' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"4","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":28.57,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":14.29,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.