Fedora 21: xen Security Update

    Date18 Jul 2015
    CategoryFedora
    8
    Posted ByLinuxSecurity Advisories
    xl command line config handling stack overflow [XSA-137, CVE-2015-3259]
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2015-11247
    2015-07-10 16:32:04
    --------------------------------------------------------------------------------
    
    Name        : xen
    Product     : Fedora 21
    Version     : 4.4.2
    Release     : 7.fc21
    URL         : http://xen.org/
    Summary     : Xen is a virtual machine monitor
    Description :
    This package contains the XenD daemon and xm command line
    tools, needed to manage virtual machines running under the
    Xen hypervisor
    
    --------------------------------------------------------------------------------
    Update Information:
    
    xl command line config handling stack overflow [XSA-137, CVE-2015-3259]
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Tue Jul  7 2015 Michael Young  - 4.4.2-7
    - xl command line config handling stack overflow [XSA-137, CVE-2015-3259]
    * Thu Jun 11 2015 Michael Young  - 4.4.2-6
    - Heap overflow in QEMU PCNET controller, allowing guest->host escape
    	[XSA-135, CVE-2015-3209] (#1230537)
    - GNTTABOP_swap_grant_ref operation misbehavior [XSA-134, CVE-2015-4163]
    - vulnerability in the iret hypercall handler [XSA-136, CVE-2015-4164]
    * Tue Jun  2 2015 Michael Young  - 4.4.2-5
    - Potential unintended writes to host MSI message data field via qemu
    	[XSA-128, CVE-2015-4103] (#1227627)
    - PCI MSI mask bits inadvertently exposed to guests [XSA-129, CVE-2015-4104]
    	(#1227628)
    - Guest triggerable qemu MSI-X pass-through error messages [XSA-130,
    	CVE-2015-4105] (#1227629)
    - Unmediated PCI register access in qemu [XSA-131, CVE-2015-4106] (#1227631)
    * Wed May 13 2015 Michael Young  - 4.4.2-4
    - Privilege escalation via emulated floppy disk drive [XSA-133,
    	CVE-2015-3456] (#1221153)
    * Mon Apr 20 2015 Michael Young  - 4.4.2-3
    - Information leak through XEN_DOMCTL_gettscinfo [XSA-132,
    	CVE-2015-3340] (#1214037)
    * Tue Mar 31 2015 Michael Young  - 4.4.2-2
    - Long latency MMIO mapping operations are not preemptible [XSA-125,
    	CVE-2015-2752] (#1207741)
    - Unmediated PCI command register access in qemu [XSA-126,
    	CVE-2015-2756] (#1307738)
    - Certain domctl operations may be abused to lock up the host [XSA-127,
    	CVE-2015-2751] (#1207739)
    * Mon Mar 23 2015 Michael Young  - 4.4.2-1
    - update to xen-4.4.2
      remove patches for fixes that are now included
    * Fri Mar 13 2015 Michael Young  - 4.4.1-16
    - Additional patch for XSA-98 on arm64
    * Thu Mar 12 2015 Michael Young  - 4.4.1-15
    - HVM qemu unexpectedly enabling emulated VGA graphics backends [XSA-119,
    	CVE-2015-2152] (#1201365)
    * Wed Mar 11 2015 Michael Young  - 4.4.1-14
    - Hypervisor memory corruption due to x86 emulator flaw [XSA-123,
    	CVE-2015-2151] (#1200398)
    * Thu Mar  5 2015 Michael Young  - 4.4.1-13
    - enable building pngs from fig files which is working again
    - fix oxenstored.service preset preuninstall script
    - arm: vgic: incorrect rate limiting of guest triggered logging [XSA-118,
    	CVE-2015-1563] (#1187153)
    - Information leak via internal x86 system device emulation [XSA-121,
    	CVE-2015-2044]
    - Information leak through version information hypercall [XSA-122,
    	CVE-2015-2045]
    * Tue Jan  6 2015 Michael Young  - 4.4.1-12
    - xen crash due to use after free on hvm guest teardown [XSA-116,
    	 CVE-2015-0361] (#1179221)
    * Tue Dec 16 2014 Michael Young  - 4.4.1-11
    - fix xendomains issue introduced by xl migrate --debug patch
    * Mon Dec  8 2014 Michael Young  - 4.4.1-10
    - p2m lock starvation [XSA-114, CVE-2014-9065]
    - fix build with --without xsm
    * Thu Nov 27 2014 Michael Young  - 4.4.1-9
    - Excessive checking in compatibility mode hypercall argument translation
    	[XSA-111, CVE-2014-8866]
    - Insufficient bounding of "REP MOVS" to MMIO emulated inside the hypervisor
    	[XSA-112, CVE-2014-8867]
    - fix segfaults and failures in xl migrate --debug (#1166461)
    * Thu Nov 20 2014 Michael Young  - 4.4.1-8
    - Guest effectable page reference leak in MMU_MACHPHYS_UPDATE handling
    	[XSA-113, CVE-2014-9030] (#1166914)
    * Tue Nov 18 2014 Michael Young  - 4.4.1-7
    - Insufficient restrictions on certain MMU update hypercalls [XSA-109,
    	CVE-2014-8594] (#1165205)
    - Missing privilege level checks in x86 emulation of far branches [XSA-110,
    	CVE-2014-8595] (#1165204)
    - Add fix for CVE-2014-0150 to qemu-dm, though it probably isn't
    	exploitable from xen (#1086776)
    --------------------------------------------------------------------------------
    
    This update can be installed with the "yum" update program.  Use
    su -c 'yum update xen' at the command line.
    For more information, refer to "Managing Software with yum",
    available at http://docs.fedoraproject.org/yum/.
    
    All packages are signed with the Fedora Project GPG key.  More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://admin.fedoraproject.org/mailman/listinfo/package-announce
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    In your opinion, what is the biggest advantage associated with choosing open-source software/products?

    Message!

    Poll results are hidden from public viewing.

    You are not authorized to vote on this poll.

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 4 answer(s).
    /component/communitypolls/?task=poll.vote
    8
    radio
    bottom200

    Advisories

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.