[SECURITY] Fedora 17 Update: xen-4.1.3-7.fc17

updates at fedoraproject.org updates at fedoraproject.org
Thu Dec 13 06:01:07 UTC 2012


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-19717
2012-12-05 06:27:46
--------------------------------------------------------------------------------

Name        : xen
Product     : Fedora 17
Version     : 4.1.3
Release     : 7.fc17
URL         : http://xen.org/
Summary     : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

--------------------------------------------------------------------------------
Update Information:

A guest can cause xen to crash [XSA-26, CVE-2012-5510] (#883082)
An HVM guest can cause xen to run slowly or crash [XSA-27, CVE-2012-5511]
(#883084)
An HVM guest can cause xen to crash or leak information [XSA-28,
CVE-2012-5512] (#883085)
A PV guest can cause xen to crash and might be able escalate privileges
[XSA-29, CVE-2012-5513] (#883088)
An HVM guest can cause xen to hang [XSA-30, CVE-2012-5514] (#883091)
A guest can cause xen to hang [XSA-31, CVE-2012-5515] (#883092)
--------------------------------------------------------------------------------
ChangeLog:

* Tue Dec  4 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.3-7
- 6 security fixes
  A guest can cause xen to crash [XSA-26, CVE-2012-5510] (#883082)
  An HVM guest can cause xen to run slowly or crash [XSA-27, CVE-2012-5511]
    (#883084)
  An HVM guest can cause xen to crash or leak information [XSA-28,
    CVE-2012-5512] (#883085)
  A PV guest can cause xen to crash and might be able escalate privileges
    [XSA-29, CVE-2012-5513] (#883088)
  An HVM guest can cause xen to hang [XSA-30, CVE-2012-5514] (#883091)
  A guest can cause xen to hang [XSA-31, CVE-2012-5515] (#883092)
* Tue Nov 13 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.3-6
- 5 security fixes
  A guest can block a cpu by setting a bad VCPU deadline [XSA 20,
    CVE-2012-4535] (#876198)
  HVM guest can use invalid pirq values to crash xen [XSA 21, CVE-2012-4536]
    (#876200)
  HVM guest can exhaust p2m table crashing xen [XSA 22, CVE-2012-4537] (#876203)
  PAE HVM guest can crash hypervisor [XSA-23, CVE-2012-4538] (#876205)
  32-bit PV guest on 64-bit hypervisor can cause an hypervisor infinite
    loop [XSA-24, CVE-2012-4539] (#876207)
* Sun Oct 28 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.3-5
- limit the size of guest kernels and ramdisks to avoid running out
  of memory on dom0 during guest boot [XSA-25, CVE-2012-4544] (#870414)
- remove pygrub.size.limits.patch patch included in new patch
* Thu Sep  6 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.3-4
- disable qemu monitor by default [XSA-19, CVE-2012-4411] (#855141)
* Wed Sep  5 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.3-3
- 5 security fixes
  a malicious 64-bit PV guest can crash the dom0 [XSA-12, CVE-2012-3494]
    (#854585)
  a malicious crash might be able to crash the dom0 or escalate privileges
    [XSA-13, CVE-2012-3495] (#854589)
  a malicious PV guest can crash the dom0 [XSA-14, CVE-2012-3496] (#854590)
  a malicious HVM guest can crash the dom0 and might be able to read
    hypervisor or guest memory [XSA-16, CVE-2012-3498] (#854593)
  an HVM guest could use VT100 escape sequences to escalate privileges to
    that of the qemu process [XSA-17, CVE-2012-3515] (#854599)
* Fri Aug 10 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.3-1 4.1.3-2
- update to 4.1.3
  includes fix for untrusted HVM guest can cause the dom0 to hang or
    crash [XSA-11, CVE-2012-3433] (#843582)
- remove patches that are now upstream
- remove some unnecessary compile fixes
- adjust upstream-23936:cdb34816a40a-rework for backported fix for
    upstream-23940:187d59e32a58
- replace pygrub.size.limits.patch with upstreamed version
- fix for (#845444) broke xend under systemd
* Tue Aug  7 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.2-25
- remove some unnecessary cache flushing that slow things down
- change python options on xend to reduce selinux problems (#845444)
* Thu Jul 26 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.2-24
- in rare circumstances an unprivileged user can crash an HVM guest
  [XSA-10,CVE-2012-3432] (#843766)
* Tue Jul 24 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.2-23
- add a patch to remove a dependency on PyXML and Require python-lxml
  instead of PyXML (#842843)
* Sun Jul 22 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.2-22
- adjust systemd service files not to report failures when running without
  a hypervisor or when xendomains.service doesn't find anything to start
* Sun Jul 22 2012 Fedora Release Engineering <rel-eng at lists.fedoraproject.org> - 4.1.2-21
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
* Tue Jun 12 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.2-20
- Apply three security patches
  64-bit PV guest privilege escalation vulnerability [CVE-2012-0217]
  guest denial of service on syscall/sysenter exception generation
    [CVE-2012-0218]
  PV guest host Denial of Service [CVE-2012-2934]
* Sat Jun  9 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.2-19
- adjust xend.service systemd file to avoid selinux problems
* Fri Jun  8 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.2-18
- Enable xenconsoled by default under systemd (#829732)
* Thu May 17 2012 Michael Young <m.a.young at durham.ac.uk> - 4.1.2-16 4.1.2-17
- make pygrub cope better with big files from guest (#818412 CVE-2012-2625)
- add patch from 4.1.3-rc2-pre to build on F17/8
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #877358 - CVE-2012-5510 kernel: xen: Grant table version switch list corruption vulnerability
        https://bugzilla.redhat.com/show_bug.cgi?id=877358
  [ 2 ] Bug #877365 - CVE-2012-5511 kernel: xen: several HVM operations do not validate the range of their inputs
        https://bugzilla.redhat.com/show_bug.cgi?id=877365
  [ 3 ] Bug #877385 - CVE-2012-5512 kernel: xen: HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak
        https://bugzilla.redhat.com/show_bug.cgi?id=877385
  [ 4 ] Bug #877391 - CVE-2012-5513 kernel: xen: XENMEM_exchange may overwrite hypervisor memory
        https://bugzilla.redhat.com/show_bug.cgi?id=877391
  [ 5 ] Bug #877393 - CVE-2012-5514 kernel: xen: Broken error handling in guest_physmap_mark_populate_on_demand()
        https://bugzilla.redhat.com/show_bug.cgi?id=877393
  [ 6 ] Bug #877397 - CVE-2012-5515 kernel: xen: Several memory hypercall operations allow invalid extent order values
        https://bugzilla.redhat.com/show_bug.cgi?id=877397
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------


More information about the package-announce mailing list