Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories» Fedora » xen 4.6.3 updates

xen 4.6.3 updates

x86: Privilege escalation in PV guests [XSA-182, CVE-2016-6258] x86: Missing SMAP whitelisting in 32-bit exception / event delivery [XSA-183, CVE-2016-6259] virtio: unbounded memory allocation issue [XSA-184, CVE-2016-5403] Qemu: scsi: esp: OOB write access in esp_do_dma [CVE-2016-6351]

  • Vendor: Fedora
  • Vendor ID: FEDORA-2016-01cc766201
  • Date: August 05, 2016


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2016-01cc766201
2016-08-05 20:19:42.084228
--------------------------------------------------------------------------------

Name : xen
Product : Fedora 24
Version : 4.6.3
Release : 4.fc24
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

--------------------------------------------------------------------------------
Update Information:

x86: Privilege escalation in PV guests [XSA-182, CVE-2016-6258] x86: Missing
SMAP whitelisting in 32-bit exception / event delivery [XSA-183, CVE-2016-6259]
virtio: unbounded memory allocation issue [XSA-184, CVE-2016-5403] Qemu: scsi:
esp: OOB write access in esp_do_dma [CVE-2016-6351]
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #1360599 - CVE-2016-6351 Qemu: scsi: esp: OOB write access in esp_do_dma
https://bugzilla.redhat.com/show_bug.cgi?id=1360599
[ 2 ] Bug #1355987 - CVE-2016-6258 xsa182 xen: x86: Privilege escalation in PV guests (XSA-182)
https://bugzilla.redhat.com/show_bug.cgi?id=1355987
[ 3 ] Bug #1355983 - CVE-2016-6259 xsa183 xen: x86: Missing SMAP whitelisting in 32-bit exception
/ event delivery (XSA-183)
https://bugzilla.redhat.com/show_bug.cgi?id=1355983
[ 4 ] Bug #1358359 - CVE-2016-5403 Qemu: virtio: unbounded memory allocation on host via guest
leading to DoS
https://bugzilla.redhat.com/show_bug.cgi?id=1358359
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at https://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
[email protected]
https://lists.fedoraproject.org/admin/lists/package-annou...

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »