--------------------------------------------------------------------------------Fedora Update Notification
FEDORA-2017-b3bdaf58bc
2017-07-01 21:00:30.997417
--------------------------------------------------------------------------------Name        : xen
Product     : Fedora 24
Version     : 4.6.5
Release     : 7.fc24
URL         : https://xenproject.org/
Summary     : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

--------------------------------------------------------------------------------Update Information:

xen: various flaws (#1463247) blkif responses leak backend stack data [XSA-216]
page transfer may allow PV guest to elevate privilege [XSA-217] Races in the
grant table unmap code [XSA-218] x86: insufficient reference counts during
shadow emulation [XSA-219] x86: PKRU and BND* leakage between vCPU-s [XSA-220]
stale P2M mappings due to insufficient error checking [XSA-222] ARM guest
disabling interrupt may crash Xen [XSA-223] grant table operations mishandle
reference counts [XSA-224] arm: vgic: Out-of-bound access when sending SGIs
[XSA-225] NULL pointer deref in event channel poll [XSA-221] (#1463231)
--------------------------------------------------------------------------------References:

  [ 1 ] Bug #1458870 - xsa216 xen: blkif responses leak backend stack data (XSA-216)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458870
  [ 2 ] Bug #1458871 - xsa217 xen: page transfer may allow PV guest to elevate privilege (XSA-217)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458871
  [ 3 ] Bug #1458872 - xsa218 xen: Races in the grant table unmap code (XSA-218)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458872
  [ 4 ] Bug #1458873 - xsa219 xen: x86: insufficient reference counts during shadow emulation (XSA-219)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458873
  [ 5 ] Bug #1458874 - xsa220 xen: x86: PKRU and BND* leakage between vCPU-s (XSA-220)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458874
  [ 6 ] Bug #1458876 - xsa222 xen: stale P2M mappings due to insufficient error checking (XSA-222)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458876
  [ 7 ] Bug #1458877 - xsa223 xen: ARM guest disabling interrupt may crash Xen (XSA-223)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458877
  [ 8 ] Bug #1458878 - xsa224 xen: grant table operations mishandle reference counts (XSA-224)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458878
  [ 9 ] Bug #1459515 - xsa225 xen: arm: vgic: Out-of-bound access when sending SGIs (XSA-225)
        https://bugzilla.redhat.com/show_bug.cgi?id=1459515
  [ 10 ] Bug #1458875 - xsa221 xen: NULL pointer deref in event channel poll (XSA-221)
        https://bugzilla.redhat.com/show_bug.cgi?id=1458875
--------------------------------------------------------------------------------This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade xen' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Fedora 24: xen Security Update 2017-b3bdaf58bc

July 2, 2017
xen: various flaws (#1463247) blkif responses leak backend stack data [XSA-216] page transfer may allow PV guest to elevate privilege [XSA-217] Races in the grant table unmap code ...

Summary

This package contains the XenD daemon and xm command line

tools, needed to manage virtual machines running under the

Xen hypervisor

xen: various flaws (#1463247) blkif responses leak backend stack data [XSA-216]

page transfer may allow PV guest to elevate privilege [XSA-217] Races in the

grant table unmap code [XSA-218] x86: insufficient reference counts during

shadow emulation [XSA-219] x86: PKRU and BND* leakage between vCPU-s [XSA-220]

stale P2M mappings due to insufficient error checking [XSA-222] ARM guest

disabling interrupt may crash Xen [XSA-223] grant table operations mishandle

reference counts [XSA-224] arm: vgic: Out-of-bound access when sending SGIs

[XSA-225] NULL pointer deref in event channel poll [XSA-221] (#1463231)

[ 1 ] Bug #1458870 - xsa216 xen: blkif responses leak backend stack data (XSA-216)

https://bugzilla.redhat.com/show_bug.cgi?id=1458870

[ 2 ] Bug #1458871 - xsa217 xen: page transfer may allow PV guest to elevate privilege (XSA-217)

https://bugzilla.redhat.com/show_bug.cgi?id=1458871

[ 3 ] Bug #1458872 - xsa218 xen: Races in the grant table unmap code (XSA-218)

https://bugzilla.redhat.com/show_bug.cgi?id=1458872

[ 4 ] Bug #1458873 - xsa219 xen: x86: insufficient reference counts during shadow emulation (XSA-219)

https://bugzilla.redhat.com/show_bug.cgi?id=1458873

[ 5 ] Bug #1458874 - xsa220 xen: x86: PKRU and BND* leakage between vCPU-s (XSA-220)

https://bugzilla.redhat.com/show_bug.cgi?id=1458874

[ 6 ] Bug #1458876 - xsa222 xen: stale P2M mappings due to insufficient error checking (XSA-222)

https://bugzilla.redhat.com/show_bug.cgi?id=1458876

[ 7 ] Bug #1458877 - xsa223 xen: ARM guest disabling interrupt may crash Xen (XSA-223)

https://bugzilla.redhat.com/show_bug.cgi?id=1458877

[ 8 ] Bug #1458878 - xsa224 xen: grant table operations mishandle reference counts (XSA-224)

https://bugzilla.redhat.com/show_bug.cgi?id=1458878

[ 9 ] Bug #1459515 - xsa225 xen: arm: vgic: Out-of-bound access when sending SGIs (XSA-225)

https://bugzilla.redhat.com/show_bug.cgi?id=1459515

[ 10 ] Bug #1458875 - xsa221 xen: NULL pointer deref in event channel poll (XSA-221)

https://bugzilla.redhat.com/show_bug.cgi?id=1458875

su -c 'dnf upgrade xen' at the command line.

For more information, refer to the dnf documentation available at

https://dnf.readthedocs.io/en/latest/command_ref.html

All packages are signed with the Fedora Project GPG key. More details on the

GPG keys used by the Fedora Project can be found at

https://fedoraproject.org/security/

package-announce mailing list -- package-announce@lists.fedoraproject.org

To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

FEDORA-2017-b3bdaf58bc 2017-07-01 21:00:30.997417 Product : Fedora 24 Version : 4.6.5 Release : 7.fc24 URL : https://xenproject.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor xen: various flaws (#1463247) blkif responses leak backend stack data [XSA-216] page transfer may allow PV guest to elevate privilege [XSA-217] Races in the grant table unmap code [XSA-218] x86: insufficient reference counts during shadow emulation [XSA-219] x86: PKRU and BND* leakage between vCPU-s [XSA-220] stale P2M mappings due to insufficient error checking [XSA-222] ARM guest disabling interrupt may crash Xen [XSA-223] grant table operations mishandle reference counts [XSA-224] arm: vgic: Out-of-bound access when sending SGIs [XSA-225] NULL pointer deref in event channel poll [XSA-221] (#1463231) [ 1 ] Bug #1458870 - xsa216 xen: blkif responses leak backend stack data (XSA-216) https://bugzilla.redhat.com/show_bug.cgi?id=1458870 [ 2 ] Bug #1458871 - xsa217 xen: page transfer may allow PV guest to elevate privilege (XSA-217) https://bugzilla.redhat.com/show_bug.cgi?id=1458871 [ 3 ] Bug #1458872 - xsa218 xen: Races in the grant table unmap code (XSA-218) https://bugzilla.redhat.com/show_bug.cgi?id=1458872 [ 4 ] Bug #1458873 - xsa219 xen: x86: insufficient reference counts during shadow emulation (XSA-219) https://bugzilla.redhat.com/show_bug.cgi?id=1458873 [ 5 ] Bug #1458874 - xsa220 xen: x86: PKRU and BND* leakage between vCPU-s (XSA-220) https://bugzilla.redhat.com/show_bug.cgi?id=1458874 [ 6 ] Bug #1458876 - xsa222 xen: stale P2M mappings due to insufficient error checking (XSA-222) https://bugzilla.redhat.com/show_bug.cgi?id=1458876 [ 7 ] Bug #1458877 - xsa223 xen: ARM guest disabling interrupt may crash Xen (XSA-223) https://bugzilla.redhat.com/show_bug.cgi?id=1458877 [ 8 ] Bug #1458878 - xsa224 xen: grant table operations mishandle reference counts (XSA-224) https://bugzilla.redhat.com/show_bug.cgi?id=1458878 [ 9 ] Bug #1459515 - xsa225 xen: arm: vgic: Out-of-bound access when sending SGIs (XSA-225) https://bugzilla.redhat.com/show_bug.cgi?id=1459515 [ 10 ] Bug #1458875 - xsa221 xen: NULL pointer deref in event channel poll (XSA-221) https://bugzilla.redhat.com/show_bug.cgi?id=1458875 su -c 'dnf upgrade xen' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

Change Log

References

Update Instructions

Severity
Product : Fedora 24
Version : 4.6.5
Release : 7.fc24
URL : https://xenproject.org/
Summary : Xen is a virtual machine monitor

Related News