Fedora 21: xen Security Update

    Date11 Apr 2015
    CategoryFedora
    120
    Posted ByLinuxSecurity Advisories
    Long latency MMIO mapping operations are not preemptible [XSA-125, CVE-2015-2752] Unmediated PCI command register access in qemu [XSA-126, CVE-2015-2756] Certain domctl operations may be abused to lock up the host [XSA-127, CVE-2015-2751] update to xen-4.4.2
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-5208
    2015-04-01 21:09:13
    --------------------------------------------------------------------------------
    
    Name        : xen
    Product     : Fedora 21
    Version     : 4.4.2
    Release     : 2.fc21
    URL         : http://xen.org/
    Summary     : Xen is a virtual machine monitor
    Description :
    This package contains the XenD daemon and xm command line
    tools, needed to manage virtual machines running under the
    Xen hypervisor
    
    --------------------------------------------------------------------------------
    Update Information:
    
    Long latency MMIO mapping operations are not preemptible [XSA-125, CVE-2015-2752]
    Unmediated PCI command register access in qemu [XSA-126, CVE-2015-2756]
    Certain domctl operations may be abused to lock up the host [XSA-127, CVE-2015-2751]
    update to xen-4.4.2
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Tue Mar 31 2015 Michael Young  - 4.4.2-2
    - Long latency MMIO mapping operations are not preemptible [XSA-125,
    	CVE-2015-2752] (#1207741)
    - Unmediated PCI command register access in qemu [XSA-126,
    	CVE-2015-2756] (#1307738)
    - Certain domctl operations may be abused to lock up the host [XSA-127,
    	CVE-2015-2751] (#1207739)
    * Mon Mar 23 2015 Michael Young  - 4.4.2-1
    - update to xen-4.4.2
      remove patches for fixes that are now included
    * Fri Mar 13 2015 Michael Young  - 4.4.1-16
    - Additional patch for XSA-98 on arm64
    * Thu Mar 12 2015 Michael Young  - 4.4.1-15
    - HVM qemu unexpectedly enabling emulated VGA graphics backends [XSA-119,
    	CVE-2015-2152] (#1201365)
    * Wed Mar 11 2015 Michael Young  - 4.4.1-14
    - Hypervisor memory corruption due to x86 emulator flaw [XSA-123,
    	CVE-2015-2151] (#1200398)
    * Thu Mar  5 2015 Michael Young  - 4.4.1-13
    - enable building pngs from fig files which is working again
    - fix oxenstored.service preset preuninstall script
    - arm: vgic: incorrect rate limiting of guest triggered logging [XSA-118,
    	CVE-2015-1563] (#1187153)
    - Information leak via internal x86 system device emulation [XSA-121,
    	CVE-2015-2044]
    - Information leak through version information hypercall [XSA-122,
    	CVE-2015-2045]
    * Tue Jan  6 2015 Michael Young  - 4.4.1-12
    - xen crash due to use after free on hvm guest teardown [XSA-116,
    	 CVE-2015-0361] (#1179221)
    * Tue Dec 16 2014 Michael Young  - 4.4.1-11
    - fix xendomains issue introduced by xl migrate --debug patch
    * Mon Dec  8 2014 Michael Young  - 4.4.1-10
    - p2m lock starvation [XSA-114, CVE-2014-9065]
    - fix build with --without xsm
    * Thu Nov 27 2014 Michael Young  - 4.4.1-9
    - Excessive checking in compatibility mode hypercall argument translation
    	[XSA-111, CVE-2014-8866]
    - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor
    	[XSA-112, CVE-2014-8867]
    - fix segfaults and failures in xl migrate --debug (#1166461)
    * Thu Nov 20 2014 Michael Young  - 4.4.1-8
    - Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
    	[XSA-113, CVE-2014-9030] (#1166914)
    * Tue Nov 18 2014 Michael Young  - 4.4.1-7
    - Insufficient restrictions on certain MMU update hypercalls [XSA-109,
    	CVE-2014-8594] (#1165205)
    - Missing privilege level checks in x86 emulation of far branches [XSA-110,
    	CVE-2014-8595] (#1165204)
    - Add fix for CVE-2014-0150 to qemu-dm, though it probably isn't
    	exploitable from xen (#1086776)
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1203732 - CVE-2015-2752 xen: long latency MMIO mapping operations are not preemptible (xsa125)
            https://bugzilla.redhat.com/show_bug.cgi?id=1203732
      [ 2 ] Bug #1203737 - CVE-2015-2756 xen: unmediated PCI command register access in qemu (xsa126)
            https://bugzilla.redhat.com/show_bug.cgi?id=1203737
      [ 3 ] Bug #1203745 - CVE-2015-2751 xen: certain domctl operations may be abused to lock up the host
            https://bugzilla.redhat.com/show_bug.cgi?id=1203745
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update xen' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.