Package "xen"
Name: |
xen
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Documentation for Xen
- Xen Hypervisor on AMD64
- Xen Hypervisor on i386
- XEN administrative tools
|
Latest version: |
4.1.6.1-0ubuntu0.12.04.13 |
Release: |
precise (12.04) |
Level: |
security |
Repository: |
universe |
Links
Other versions of "xen" in Precise
Packages in group
Deleted packages are displayed in grey.
Changelog
xen (4.1.6.1-0ubuntu0.12.04.7) precise-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2015-7835 / XSA-148
* x86: guard against undue super page PTE creation
- CVE-2015-7969 / XSA-149
* xen: free domain's vcpu array
- CVE-2015-7970 / XSA-150
* x86/PoD: Eager sweep for zeroed pages
- CVE-2015-7969 / XSA-151
* xenoprof: free domain's vcpu array
- CVE-2015-7971 / XSA-152
* x86: rate-limit logging in do_xen{oprof,pmu}_op()
- CVE-2015-7972 / XSA-153
* libxl: adjust PoD target by memory fudge, too
- CVE-2015-5307 / XSA-156
* x86/HVM: always intercept #AC and #DB
-- Stefan Bader Mon, 23 Nov 2015 11:57:02 +0100
|
Source diff to previous version |
CVE-2015-7835 |
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV gues |
CVE-2015-7969 |
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memo |
CVE-2015-7970 |
The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest adm |
CVE-2015-7971 |
Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local gu |
CVE-2015-7972 |
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4. |
CVE-2015-5307 |
RESERVED |
|
xen (4.1.6.1-0ubuntu0.12.04.6) precise-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2014-5146 / XSA-097
* Combine hap/shadow and log_dirty_log
* x86/mm/hap: Adjust vram tracking to play nicely with log-dirty.
* x86/paging: make log-dirty operations preemptible
- CVE-2015-2752 / XSA-125
* Limit XEN_DOMCTL_memory_mapping hypercall to only process up to 64
GFNs (or less)
- CVE-2015-2756 / XSA-126 (QEMU traditional)
* xen: limit guest control of PCI command register
- CVE-2015-4103 / XSA-128
* properly gate host writes of modified PCI CFG contents
- CVE-2015-4104 / XSA-129
* xen: don't allow guest to control MSI mask register
- CVE-2015-4105 / XSA-130
* xen/MSI-X: disable logging by default
- CVE-2015-4106 / XSA-131
* xen/MSI: don't open-code pass-through of enable bit modifications
* xen/pt: consolidate PM capability emu_mask
* xen/pt: correctly handle PM status bit
* xen/pt: split out calculation of throughable mask in PCI config space
handling
* xen/pt: mark all PCIe capability bits read-only
* xen/pt: mark reserved bits in PCI config space fields
* xen/pt: add a few PCI config space field descriptions
* xen/pt: unknown PCI config space fields should be read-only
- CVE-2015-3340 / XSA-132
* domctl/sysctl: don't leak hypervisor stack to toolstacks
- CVE-2015-3456 / XSA-133
* qemut: fdc: force the fifo access to be in bounds of the
allocated buffer
- CVE-2015-3209 / XSA-135
* pcnet: fix Negative array index read
* pcnet: force the buffer access to be in bounds during tx
- CVE-2015-4164 / XSA-136
* x86/traps: loop in the correct direction in compat_iret()
- CVE-2015-3259 / XSA-137
* xl: Sane handling of extra config file arguments
- CVE-2015-5154 / XSA-138
* ide: Check array bounds before writing to io_buffer
* ide: Clear DRQ after handling all expected accesses
- CVE-2015-5165 / XSA-140
* rtl8139: avoid nested ifs in IP header parsing
* rtl8139: drop tautologous if (ip) {...} statement
* rtl8139: skip offload on short Ethernet/IP header
* rtl8139: check IP Header Length field
* rtl8139: check IP Total Length field
* rtl8139: skip offload on short TCP header
* rtl8139: check TCP Data Offset field
-- Stefan Bader Wed, 01 Apr 2015 16:38:31 +0200
|
Source diff to previous version |
CVE-2014-5146 |
Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preem |
CVE-2015-2752 |
The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptable, which allows local x86 H |
CVE-2015-2756 |
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to caus |
CVE-2015-4103 |
Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators c |
CVE-2015-4104 |
Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service ( |
CVE-2015-4105 |
Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (ho |
CVE-2015-4106 |
QEMU does not properly restrict write access to the PCI config space for certain PCI pass-through devices, which mighy allow local x86 HVM guests to |
CVE-2015-3340 |
Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory v |
CVE-2015-3456 |
vulnerability in QEMU's virtual Floppy Disk Controller |
CVE-2015-3209 |
heap overflow in qemu pcnet controller allowing guest to host escape |
CVE-2015-4164 |
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a d |
CVE-2015-3259 |
Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long |
CVE-2015-5154 |
Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local |
CVE-2015-5165 |
The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read pro |
|
xen (4.1.6.1-0ubuntu0.12.04.5) precise-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2015-2152 / XSA-119
* tools: libxl: Explicitly disable graphics backends on qemu
cmdline
- CVE-2015-2044 / XSA-121
* x86/HVM: return all ones on wrong-sized reads of system device I/O
ports
- CVE-2015-2045 / XSA-122
* pre-fill structures for certain HYPERVISOR_xen_version sub-ops
- CVE-2015-2151 / XSA-123
* x86emul: fully ignore segment override for register-only operations
-- Stefan Bader <email address hidden> Wed, 04 Mar 2015 10:59:53 +0100
|
Source diff to previous version |
CVE-2015-2152 |
HVM qemu unexpectedly enabling emulated VGA graphics backends |
CVE-2015-2044 |
Information leak via internal x86 system device emulation |
CVE-2015-2045 |
Information leak through version information hypercall |
CVE-2015-2151 |
Hypervisor memory corruption due to x86 emulator flaw |
|
xen (4.1.6.1-0ubuntu0.12.04.4) precise-security; urgency=low
* Applying Xen Security Advisories:
- CVE-2014-8594 / XSA-109
* x86: don't allow page table updates on non-PV page tables in
do_mmu_update()
- CVE-2014-8595 / XSA-110
* x86emul: enforce privilege level restrictions when loading CS
- CVE-2014-8866 / XSA-111
* x86: limit checks in hypercall_xlat_continuation() to actual arguments
- CVE-2014-8867 / XSA-112
* x86/HVM: confine internally handled MMIO to solitary regions
- CVE-2014-9030 / XSA-113
* x86/mm: fix a reference counting error in MMU_MACHPHYS_UPDATE
-- Stefan Bader <email address hidden> Fri, 21 Nov 2014 15:29:19 +0100
|
Source diff to previous version |
CVE-2014-8594 |
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote P |
CVE-2014-8595 |
arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileg |
CVE-2014-8866 |
XSA-111 |
CVE-2014-8867 |
XSA-112 |
CVE-2014-9030 |
The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause |
|
No changelog available yet.
|
About
-
Send Feedback to @ubuntu_updates