Objavljena je nova inačica paketa Xen, za operacijske sustave Fedora 16 i 17, kojom se ispravlja sigurnosni propust. Lokalnim napadačima omogućuje izvođenje DoS napada.
Paket: | xen 4.x |
Operacijski sustavi: | Fedora 16, Fedora 17 |
Kritičnost: | 3.8 |
Problem: | pogreška u programskoj komponenti |
Iskorištavanje: | lokalno |
Posljedica: | uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-3433 |
Izvorni ID preporuke: | FEDORA-2012-11755 |
Izvor: | Fedora |
Problem: | |
Propust je posljedica neodgovarajućeg rukovanja prostorom fizičke adrese prilikom prekidanja p2m preslikavanja. |
|
Posljedica: | |
Napadači ga mogu iskoristiti za izvođenje DoS (Denial of Service) napada. |
|
Rješenje: | |
Korisnicima se preporuča instalacija odgovarajuće nadogradnje. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-11755
2012-08-13 01:43:05
--------------------------------------------------------------------------------
Name : xen
Product : Fedora 17
Version : 4.1.3
Release : 2.fc17
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
--------------------------------------------------------------------------------
Update Information:
fix for (#845444) broke xend under systemd,
update to 4.1.3, includes fix for untrusted HVM guest can cause the dom0 to hang
or crash [XSA-11, CVE-2012-3433] (#843582) remove some unnecessary cache
flushing that slow things down, change python options on xend to reduce selinux
problems (#845444)
--------------------------------------------------------------------------------
ChangeLog:
* Fri Aug 10 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.3-1 4.1.3-2
- update to 4.1.3
includes fix for untrusted HVM guest can cause the dom0 to hang or
crash [XSA-11, CVE-2012-3433] (#843582)
- remove patches that are now upstream
- remove some unnecessary compile fixes
- adjust upstream-23936:cdb34816a40a-rework for backported fix for
upstream-23940:187d59e32a58
- replace pygrub.size.limits.patch with upstreamed version
- fix for (#845444) broke xend under systemd
* Tue Aug 7 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-25
- remove some unnecessary cache flushing that slow things down
- change python options on xend to reduce selinux problems (#845444)
* Thu Jul 26 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-24
- in rare circumstances an unprivileged user can crash an HVM guest
[XSA-10,CVE-2012-3432] (#843766)
* Tue Jul 24 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-23
- add a patch to remove a dependency on PyXML and Require python-lxml
instead of PyXML (#842843)
* Sun Jul 22 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-22
- adjust systemd service files not to report failures when running without
a hypervisor or when xendomains.service doesn't find anything to start
* Sun Jul 22 2012 Fedora Release Engineering <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> -
4.1.2-21
- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild
* Tue Jun 12 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-20
- Apply three security patches
64-bit PV guest privilege escalation vulnerability [CVE-2012-0217]
guest denial of service on syscall/sysenter exception generation
[CVE-2012-0218]
PV guest host Denial of Service [CVE-2012-2934]
* Sat Jun 9 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-19
- adjust xend.service systemd file to avoid selinux problems
* Fri Jun 8 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-18
- Enable xenconsoled by default under systemd (#829732)
* Thu May 17 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-16 4.1.2-17
- make pygrub cope better with big files from guest (#818412 CVE-2012-2625)
- add patch from 4.1.3-rc2-pre to build on F17/8
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #843582 - CVE-2012-3433 kernel: xen: HVM guest destroy p2m teardown
host DoS vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=843582
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-11785
2012-08-13 01:45:01
--------------------------------------------------------------------------------
Name : xen
Product : Fedora 16
Version : 4.1.3
Release : 1.fc16
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
--------------------------------------------------------------------------------
Update Information:
update to 4.1.3 - fixes untrusted HVM guest can cause the dom0 to hang
or crash [XSA-11, CVE-2012-3433] (#843582)
remove some unnecessary cache flushing that slow things down (#841330)
--------------------------------------------------------------------------------
ChangeLog:
* Sat Aug 11 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.3-1
- includes fix for untrusted HVM guest can cause the dom0 to hang or
crash [XSA-11, CVE-2012-3433] (#843582)
- remove patches that are now upstream
- remove some unnecessary compile fixes
- adjust upstream-23936:cdb34816a40a-rework for backported fix for
upstream-23940:187d59e32a58
- replace pygrub.size.limits.patch with upstreamed version
* Wed Aug 8 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-10
- remove some unnecessary cache flushing that slow things down (#841330)
* Fri Jul 27 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-9
- in rare circumstances an unprivileged user can crash an HVM guest
[XSA-10, CVE-2012-3432] (#843766)
* Wed Jun 13 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-8
- make pygrub cope better with big files from guest (#818412 CVE-2012-2625)
- 64-bit PV guest privilege escalation vulnerability [CVE-2012-0217]
- guest denial of service on syscall/sysenter exception generation
[CVE-2012-0218]
- PV guest host Denial of Service [CVE-2012-2934]
* Tue May 8 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-7
- Make the udev tap rule more specific as it breaks openvpn (#819452)
- load xen-acpi-processor module (kernel 3.4 onwards) if present
* Thu Feb 2 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-6
- Fix buffer overflow in e1000 emulation for HVM guests [CVE-2012-0029]
* Sat Jan 28 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-5
- Start building xen's ocaml libraries if appropriate unless --without ocaml
was specified
- add some backported patches from xen unstable (via Debian) for some
ocaml tidying and fixes
* Sun Jan 15 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-4
- actually apply the xend-pci-loop.patch
- compile fixes for gcc-4.7
* Wed Jan 11 2012 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-3
- Add xend-pci-loop.patch to stop xend crashing with weird PCI cards (#767742)
- avoid a backtrace if xend can't log to the standard file or a
temporary directory (part of #741042)
* Mon Nov 21 2011 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-2
- Fix lost interrupts on emulated devices
- stop xend crashing if its state files are empty at start up
- avoid a python backtrace if xend is run on bare metal
- update grub2 configuration after the old hypervisor has gone
- move blktapctrl to systemd
- Drop obsolete dom0-kernel.repo file
* Fri Oct 21 2011 Michael Young <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 4.1.2-1
- update to 4.1.2
remove upstream patches xen-4.1-testing.23104 and xen-4.1-testing.23112
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #843582 - CVE-2012-3433 kernel: xen: HVM guest destroy p2m teardown
host DoS vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=843582
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update xen' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke