UbuntuUpdates.org

Package "libxenstore3.0"

Name: libxenstore3.0

Description:

Xenstore communications library for Xen

Latest version: 4.1.6.1-0ubuntu0.12.04.13
Release: precise (12.04)
Level: security
Repository: main
Head package: xen

Links


Download "libxenstore3.0"


Other versions of "libxenstore3.0" in Precise

Repository Area Version
base main 4.1.2-2ubuntu2
updates main 4.1.6.1-0ubuntu0.12.04.13

Changelog

Version: 4.1.6.1-0ubuntu0.12.04.7 2015-11-23 22:06:23 UTC

  xen (4.1.6.1-0ubuntu0.12.04.7) precise-security; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2015-7835 / XSA-148
      * x86: guard against undue super page PTE creation
    - CVE-2015-7969 / XSA-149
      * xen: free domain's vcpu array
    - CVE-2015-7970 / XSA-150
      * x86/PoD: Eager sweep for zeroed pages
    - CVE-2015-7969 / XSA-151
      * xenoprof: free domain's vcpu array
    - CVE-2015-7971 / XSA-152
      * x86: rate-limit logging in do_xen{oprof,pmu}_op()
    - CVE-2015-7972 / XSA-153
      * libxl: adjust PoD target by memory fudge, too
    - CVE-2015-5307 / XSA-156
      * x86/HVM: always intercept #AC and #DB

 -- Stefan Bader Mon, 23 Nov 2015 11:57:02 +0100

Source diff to previous version
CVE-2015-7835 The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV gues
CVE-2015-7969 Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memo
CVE-2015-7970 The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest adm
CVE-2015-7971 Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local gu
CVE-2015-7972 The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.
CVE-2015-5307 RESERVED

Version: 4.1.6.1-0ubuntu0.12.04.6 2015-09-02 21:06:52 UTC

  xen (4.1.6.1-0ubuntu0.12.04.6) precise-security; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-5146 / XSA-097
      * Combine hap/shadow and log_dirty_log
      * x86/mm/hap: Adjust vram tracking to play nicely with log-dirty.
      * x86/paging: make log-dirty operations preemptible
    - CVE-2015-2752 / XSA-125
      * Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64
        GFNs (or less)
    - CVE-2015-2756 / XSA-126 (QEMU traditional)
      * xen: limit guest control of PCI command register
    - CVE-2015-4103 / XSA-128
      * properly gate host writes of modified PCI CFG contents
    - CVE-2015-4104 / XSA-129
      * xen: don't allow guest to control MSI mask register
    - CVE-2015-4105 / XSA-130
      * xen/MSI-X: disable logging by default
    - CVE-2015-4106 / XSA-131
      * xen/MSI: don't open-code pass-through of enable bit modifications
      * xen/pt: consolidate PM capability emu_mask
      * xen/pt: correctly handle PM status bit
      * xen/pt: split out calculation of throughable mask in PCI config space
        handling
      * xen/pt: mark all PCIe capability bits read-only
      * xen/pt: mark reserved bits in PCI config space fields
      * xen/pt: add a few PCI config space field descriptions
      * xen/pt: unknown PCI config space fields should be read-only
    - CVE-2015-3340 / XSA-132
      * domctl/sysctl: don't leak hypervisor stack to toolstacks
    - CVE-2015-3456 / XSA-133
      * qemut: fdc: force the fifo access to be in bounds of the
        allocated buffer
    - CVE-2015-3209 / XSA-135
      * pcnet: fix Negative array index read
      * pcnet: force the buffer access to be in bounds during tx
    - CVE-2015-4164 / XSA-136
      * x86/traps: loop in the correct direction in compat_iret()
    - CVE-2015-3259 / XSA-137
      * xl: Sane handling of extra config file arguments
    - CVE-2015-5154 / XSA-138
      * ide: Check array bounds before writing to io_buffer
      * ide: Clear DRQ after handling all expected accesses
    - CVE-2015-5165 / XSA-140
      * rtl8139: avoid nested ifs in IP header parsing
      * rtl8139: drop tautologous if (ip) {...} statement
      * rtl8139: skip offload on short Ethernet/IP header
      * rtl8139: check IP Header Length field
      * rtl8139: check IP Total Length field
      * rtl8139: skip offload on short TCP header
      * rtl8139: check TCP Data Offset field

 -- Stefan Bader Wed, 01 Apr 2015 16:38:31 +0200

Source diff to previous version
CVE-2014-5146 Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preem
CVE-2015-2752 The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptable, which allows local x86 H
CVE-2015-2756 QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to caus
CVE-2015-4103 Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators c
CVE-2015-4104 Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (
CVE-2015-4105 Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (ho
CVE-2015-4106 QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which mighy allow local x86 HVM guests to
CVE-2015-3340 Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory v
CVE-2015-3456 vulnerability in QEMU's virtual Floppy Disk Controller
CVE-2015-3209 heap overflow in qemu pcnet controller allowing guest to host escape
CVE-2015-4164 The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a d
CVE-2015-3259 Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long
CVE-2015-5154 Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local
CVE-2015-5165 The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read pro

Version: 4.1.6.1-0ubuntu0.12.04.5 2015-03-12 15:06:25 UTC

  xen (4.1.6.1-0ubuntu0.12.04.5) precise-security; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2015-2152 / XSA-119
      * tools: libxl: Explicitly disable graphics backends on qemu
        cmdline
    - CVE-2015-2044 / XSA-121
      * x86/HVM: return all ones on wrong-sized reads of system device I/O
        ports
    - CVE-2015-2045 / XSA-122
      * pre-fill structures for certain HYPERVISOR_xen_version sub-ops
    - CVE-2015-2151 / XSA-123
      * x86emul: fully ignore segment override for register-only operations
 -- Stefan Bader <email address hidden> Wed, 04 Mar 2015 10:59:53 +0100

Source diff to previous version
CVE-2015-2152 HVM qemu unexpectedly enabling emulated VGA graphics backends
CVE-2015-2044 Information leak via internal x86 system device emulation
CVE-2015-2045 Information leak through version information hypercall
CVE-2015-2151 Hypervisor memory corruption due to x86 emulator flaw

Version: 4.1.6.1-0ubuntu0.12.04.4 2014-11-27 18:06:33 UTC

  xen (4.1.6.1-0ubuntu0.12.04.4) precise-security; urgency=low

  * Applying Xen Security Advisories:
    - CVE-2014-8594 / XSA-109
      * x86: don't allow page table updates on non-PV page tables in
        do_mmu_update()
    - CVE-2014-8595 / XSA-110
      * x86emul: enforce privilege level restrictions when loading CS
    - CVE-2014-8866 / XSA-111
      * x86: limit checks in hypercall_xlat_continuation() to actual arguments
    - CVE-2014-8867 / XSA-112
      * x86/HVM: confine internally handled MMIO to solitary regions
    - CVE-2014-9030 / XSA-113
      * x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE
 -- Stefan Bader <email address hidden> Fri, 21 Nov 2014 15:29:19 +0100

Source diff to previous version
CVE-2014-8594 The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote P
CVE-2014-8595 arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileg
CVE-2014-8866 XSA-111
CVE-2014-8867 XSA-112
CVE-2014-9030 The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause

Version: 4.1.6.1-0ubuntu0.12.04.3 2014-10-01 13:06:38 UTC
No changelog available yet.



About   -   Send Feedback to @ubuntu_updates