Download
| Alert*
oval:org.secpod.oval:def:89045347
This update for xen fixes the following issues: - A Mishandling of SYSCALL singlestep during emulation which could have lead to privilege escalation. - CMPXCHG8B emulation failed to ignore operand size override which could have lead to information disclosure. - PV guests may have been able to mask ... oval:org.secpod.oval:def:1800376 CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts Reference CVE-2016-10025, XSA-203: x86: missing NULL pointer check in VMFUNC emulation Reference CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL singlestep during emulation Reference oval:org.secpod.oval:def:1800884 CVE-2016-10024, XSA-202: x86 PV guests may be able to mask interrupts. Reference: CVE-2016-10025, XSA-203: x86: missing NULL pointer check in VMFUNC emulation. Reference: CVE-2016-10013, XSA-204: x86: Mishandling of SYSCALL single step during emulation. Reference: oval:org.secpod.oval:def:89045332 This update for xen fixes the following issues: - A Mishandling of SYSCALL singlestep during emulation which could have lead to privilege escalation. - CMPXCHG8B emulation failed to ignore operand size override which could have lead to information disclosure. - PV guests may have been able to mask ... oval:org.secpod.oval:def:111797 This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor oval:org.secpod.oval:def:111822 This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor oval:org.secpod.oval:def:602872 Jan Beulich and Jann Horn discovered multiple vulnerabilities in the Xen hypervisor, which may lead to privilege escalation, guest-to-host breakout, denial of service or information leaks. In additional to the CVE identifiers listed above, this update also addresses the vulnerabilities announced as ... |