Fedora 28: xen Security Update 2018-a7862a75f5
Summary
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891]
(#1595959) x86: #DB exception safety check can be triggered by a guest [XSA-265,
CVE-2018-12893] (#1595958) libxl fails to honour readonly flag on HVM emulated
SCSI disks [XSA-266, CVE-2018-12892] (#1595957)
* Wed Jun 27 2018 Michael Young
- preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891]
(#1595959)
- x86: #DB exception safety check can be triggered by a guest [XSA-265,
CVE-2018-12893] (#1595958)
- libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266,
CVE-2018-12892] (#1595957)
* Fri Jun 15 2018 Michael Young
- Speculative register leakage from lazy FPU context switching
[XSA-267, CVE-2018-3665]
- fix for change in iasl output
* Tue May 22 2018 Michael Young
- Speculative Store Bypass [XSA-263, CVE-2018-3639]
(with extra patches so it applies cleanly)
* Tue May 8 2018 Michael Young
- x86: mishandling of debug exceptions [XSA-260, CVE-2018-8897]
- x86 vHPET interrupt injection errors [XSA-261, CVE-2018-10982] (#1576089)
- qemu may drive Xen into unbounded loop [XSA-262, CVE-2018-10981] (#1576680)
* Thu May 3 2018 Michael Young
- update to xen-4.10.1
adjust xen.use.fedora.ipxe.patch and xen.fedora.efi.build.patch
remove patches for issues now fixed upstream
package /usr/lib/debug/usr/lib/xen/boot/xen-shim-syms
* Wed Apr 25 2018 Michael Young
- Information leak via crafted user-supplied CDROM [XSA-258, CVE-2018-10472]
(#1571867)
- x86: PV guest may crash Xen with XPTI [XSA-259, CVE-2018-10471] (#1571878)
[ 1 ] Bug #1590984 - CVE-2018-12892 xsa-266 xen: libxl fails to honour readonly flag on HVM emulated SCSI disks
https://bugzilla.redhat.com/show_bug.cgi?id=1590984
[ 2 ] Bug #1590979 - CVE-2018-12893 xen: x86 DB exception safety check can be triggered by a guest (XSA-265)
https://bugzilla.redhat.com/show_bug.cgi?id=1590979
[ 3 ] Bug #1590985 - CVE-2018-12891 xen: preemption checks bypassed in x86 PV MM handling (XSA-264)
https://bugzilla.redhat.com/show_bug.cgi?id=1590985
su -c 'dnf upgrade --advisory FEDORA-2018-a7862a75f5' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMJHHOEWJUENZ5JJ3RBMCVUWTYYF4GDE/
FEDORA-2018-a7862a75f5 2018-07-03 16:49:24.958420 Product : Fedora 28 Version : 4.10.1 Release : 5.fc28 URL : https://xenproject.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891] (#1595959) x86: #DB exception safety check can be triggered by a guest [XSA-265, CVE-2018-12893] (#1595958) libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266, CVE-2018-12892] (#1595957) * Wed Jun 27 2018 Michael Young - 4.10.1-5 - preemption checks bypassed in x86 PV MM handling [XSA-264, CVE-2018-12891] (#1595959) - x86: #DB exception safety check can be triggered by a guest [XSA-265, CVE-2018-12893] (#1595958) - libxl fails to honour readonly flag on HVM emulated SCSI disks [XSA-266, CVE-2018-12892] (#1595957) * Fri Jun 15 2018 Michael Young - 4.10.1-4 - Speculative register leakage from lazy FPU context switching [XSA-267, CVE-2018-3665] - fix for change in iasl output * Tue May 22 2018 Michael Young - 4.10.1-3 - Speculative Store Bypass [XSA-263, CVE-2018-3639] (with extra patches so it applies cleanly) * Tue May 8 2018 Michael Young - 4.10.1-2 - x86: mishandling of debug exceptions [XSA-260, CVE-2018-8897] - x86 vHPET interrupt injection errors [XSA-261, CVE-2018-10982] (#1576089) - qemu may drive Xen into unbounded loop [XSA-262, CVE-2018-10981] (#1576680) * Thu May 3 2018 Michael Young - 4.10.1-1 - update to xen-4.10.1 adjust xen.use.fedora.ipxe.patch and xen.fedora.efi.build.patch remove patches for issues now fixed upstream package /usr/lib/debug/usr/lib/xen/boot/xen-shim-syms * Wed Apr 25 2018 Michael Young - 4.10.0-9 - Information leak via crafted user-supplied CDROM [XSA-258, CVE-2018-10472] (#1571867) - x86: PV guest may crash Xen with XPTI [XSA-259, CVE-2018-10471] (#1571878) [ 1 ] Bug #1590984 - CVE-2018-12892 xsa-266 xen: libxl fails to honour readonly flag on HVM emulated SCSI disks https://bugzilla.redhat.com/show_bug.cgi?id=1590984 [ 2 ] Bug #1590979 - CVE-2018-12893 xen: x86 DB exception safety check can be triggered by a guest (XSA-265) https://bugzilla.redhat.com/show_bug.cgi?id=1590979 [ 3 ] Bug #1590985 - CVE-2018-12891 xen: preemption checks bypassed in x86 PV MM handling (XSA-264) https://bugzilla.redhat.com/show_bug.cgi?id=1590985 su -c 'dnf upgrade --advisory FEDORA-2018-a7862a75f5' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AMJHHOEWJUENZ5JJ3RBMCVUWTYYF4GDE/
Change Log
References