Fedora 24: xen Security Update 2017-c9d71f0860
Summary
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
xen: various flaws (#1447345) x86: 64bit PV guest breakout via pagetable use-after-mode-change [XSA-213] grant transfer allows PV guest to elevate privileges
[XSA-214] possible memory corruption via failsafe callback [XSA-215]
[ 1 ] Bug #1443220 - CVE-2017-8905 xsa215 xen: possible memory corruption via failsafe callback (XSA-215)
https://bugzilla.redhat.com/show_bug.cgi?id=1443220
[ 2 ] Bug #1443222 - CVE-2017-8903 xsa213 xen: x86: 64bit PV guest breakout via pagetable use-after-mode-change (XSA-213)
https://bugzilla.redhat.com/show_bug.cgi?id=1443222
[ 3 ] Bug #1443223 - CVE-2017-8904 xsa214 xen: grant transfer allows PV guest to elevate privileges (XSA-214)
https://bugzilla.redhat.com/show_bug.cgi?id=1443223
su -c 'dnf upgrade xen' at the command line.
For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
FEDORA-2017-c9d71f0860 2017-05-14 20:15:03.388249 Product : Fedora 24 Version : 4.6.5 Release : 6.fc24 URL : https://xenproject.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor xen: various flaws (#1447345) x86: 64bit PV guest breakout via pagetable use-after-mode-change [XSA-213] grant transfer allows PV guest to elevate privileges [XSA-214] possible memory corruption via failsafe callback [XSA-215] [ 1 ] Bug #1443220 - CVE-2017-8905 xsa215 xen: possible memory corruption via failsafe callback (XSA-215) https://bugzilla.redhat.com/show_bug.cgi?id=1443220 [ 2 ] Bug #1443222 - CVE-2017-8903 xsa213 xen: x86: 64bit PV guest breakout via pagetable use-after-mode-change (XSA-213) https://bugzilla.redhat.com/show_bug.cgi?id=1443222 [ 3 ] Bug #1443223 - CVE-2017-8904 xsa214 xen: grant transfer allows PV guest to elevate privileges (XSA-214) https://bugzilla.redhat.com/show_bug.cgi?id=1443223 su -c 'dnf upgrade xen' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Change Log
References