Page tree
Skip to end of metadata
Go to start of metadata

Xen 3.4.4-30 (OnApp)

31st Jan 2017

Issue

Summary 

XSA-199/CVE-2016-9637Qemu IO port array overflow
XSA-200/CVE-2016-9932X86 CMPXCHG8B emulation fails to ignore operand size override

XSA-202/CVE-2016-10024

X86 PV guests may be able to mask interrupts

XSA-204/CVE-2016-10013

X86: mishandling of SYSCALL singlestep during emulation

Only use these RPM's if your hypervisor is RHEL 5 based and you currently run Xen version 3.4.x.

To install:

rpm -ihv http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-3.4.4-30.el5.onapp.x86_64.rpm http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-devel-3.4.4-30.el5.onapp.x86_64.rpm http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-libs-3.4.4-30.el5.onapp.x86_64.rpm 

You many need to supply the --oldpackage or --force flag dependent on your current Xen version.

Xen 3.4.4-27 (OnApp)

08th Dec 2016

Issue

Summary 

XSA-191/CVE-2016-9386X86 null segments not always treated as unusable
XSA-192/CVE-2016-9382X86 task switch to VM86 mode mis-handeled

XSA-193/CVE-2016-9385

X86 segment base write emulation lacking canonical address checks

XSA-195/CVE-2016-9383

X86 64-bit test instruction emulation broken
XSA-197/CVE-2016-9381QEMU incautious about shared ring processing

XSA-198/CVE-2016-9379,CVE-2016-9380

Delimiter injection vulnerabilities in PyGrub

XSA-199/CVE-2016-9637

Qemu IO port array overflow

Only use these RPM's if your hypervisor is RHEL 5 based and you currently run Xen version 3.4.x.

To install:

rpm -ihv http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-3.4.4-27.el5.onapp.x86_64.rpm http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-devel-3.4.4-27.el5.onapp.x86_64.rpm http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-libs-3.4.4-27.el5.onapp.x86_64.rpm 

You many need to supply the --oldpackage or --force flag dependent on your current Xen version.

Xen 3.4.4-25 (OnApp)

11th Oct 2016

IssueSummary
XSA-155/CVE-2015-8550Paravirtualized drivers incautious about shared memory contents. 
XSA-156/CVE-2015-5307CPU lockup during fault delivery.
XSA-157/CVE-2015-8551,CVE-2015-8552,CVE-2015-8553Linux pciback missing sanity checks leading to crash.
XSA-158/CVE-2015-8338Long running memory operations on ARM.
XSA-159/CVE-2015-8339, CVE-2015-8340Xenmem_exchange error handling issues.
XSA-160/CVE-2015-8341LIbXL leak of PV kernel and initrd on error.
XSA-161Missing xsetbv intercept privilege check on AMD SVM.
XSA-162/CVE-2015-7504Heap buffer overflow vulnerability in PCNet emulator.
XSA-163VMPU' setting on compute resource.
XSA-164/CVE-2015-8554QEMU-DM buffer overrun in MSI-X handling.
XSA-165/CVE-2015-8555Information leak in legacy X86 FPU/XMM initialization.
XSA-166IOREQ handling possibly susceptible to multiple read issue.
XSA-180/CVE-2014-3672Unrestricted QEMU logging.
XSA-182/CVE-2016-6258Privilege escalation in PV guests
XSA-185/CVE-2016-7092Disallow L3 recurcive pagetable for 32-bit PV guests.
XSA-186/CVE-2016-7093Mishandling of instruction pointer truncation during emulation.
XSA-187/CVE-2016-7094Overflow ofSH_CTXT->SEG_REG[].
XSA-188/CVE-2016-7154Use after free in FIFO event channel code.
XSA-190/CVE-2016-7777CR0.TS and CR0.EM not always honored for X86 HVM guests.

Only use these RPM's if your hypervisor is RHEL 5 based and you currently run Xen version 3.4.x.

To install:

rpm -ihv http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-3.4.4-25.el5.onapp.x86_64.rpm http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-devel-3.4.4-25.el5.onapp.x86_64.rpm http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-libs-3.4.4-25.el5.onapp.x86_64.rpm 

You many need to supply the --oldpackage or --force flag dependent on your current Xen version.

Xen 3.4.4-17 (OnApp)

29th Oct 2015


Issue
Summary
XSA-148/CVE-2015-7835

Uncontrolled creation of large page mappings by PV guests.

XSA-150/CVE-2015-7970Long latency populate-on-demand operation is not preemptible.
XSA-152/CVE-2015-7971

Some pmu and profiling hypercalls log without rate limiting.

XSA-153/CVE-2015-7972Populate-on-demend balloon size inaccuracy can crash guests.


Only use these RPM's if your hypervisor is RHEL 5 based and you currently run Xen version 3.4.x

To install:

rpm -ihv http://mirror-usa-dallas.solusvm.com/xen/xen-3.4.4-17.el5.onapp.x86_64.rpm http://mirror-usa-dallas.solusvm.com/xen/xen-devel-3.4.4-17.el5.onapp.x86_64.rpm http://mirror-usa-dallas.solusvm.com/xen/xen-libs-3.4.4-17.el5.onapp.x86_64.rpm


You many need to supply the --oldpackage or --force flag dependent on your current xen version


Xen 3.4.4-14 (OnApp)

26th July 2015

This release patches XSA-138 http://xenbits.xen.org/xsa/advisory-138.html


Only use these RPM's if your hypervisor is RHEL 5 based and you currently run Xen version 3.4.x

To install:

rpm -ihv http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-3.4.4-14.el5.onapp.x86_64.rpm http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-devel-3.4.4-14.el5.onapp.x86_64.rpm http://rpm.repo.onapp.com/repo/centos/5/x86_64/RPMS-3.0.0/xen-libs-3.4.4-14.el5.onapp.x86_64.rpm

You many need to supply the --oldpackage or --force flag dependent on your current xen version


Xen 3.4.4-8 (OnApp)

14th May 2015

The following RPM's are in testing but available for use. This release patches CVE-2015-3456 (VENOM QEMU vulnerability) https://access.redhat.com/articles/1444903


Only use these RPM's if your hypervisor is RHEL 5 based and you currently run Xen version 3.4.x

To install:

rpm -ihv http://mirror-usa-dallas.solusvm.com/xen/testing/xen-3.4.4-8.el5.onapp.x86_64.rpm http://mirror-usa-dallas.solusvm.com/xen/testing/xen-debuginfo-3.4.4-8.el5.onapp.x86_64.rpm http://mirror-usa-dallas.solusvm.com/xen/testing/xen-devel-3.4.4-8.el5.onapp.x86_64.rpm http://mirror-usa-dallas.solusvm.com/xen/testing/xen-libs-3.4.4-8.el5.onapp.x86_64.rpm 

You many need to supply the --oldpackage or --force flag dependent on your current xen version

Following the update, the guests (virtual machines) need to be powered off and started up again for the update to take effect. Please note that it is not enough to restart the guests because a restarted guest would continue running using the same (old, not updated) QEMU binary.

  • No labels