| xen-ocaml-4.6.6-1.fc24.x86_64
[510 KiB] |
Changelog
by Michael Young (2017-07-07):
- update to xen-4.6.6
adjust xen.use.fedora.ipxe.patch
remove upstream patches
|
| xen-ocaml-4.6.5-7.fc24.x86_64
[509 KiB] |
Changelog
by Michael Young (2017-06-22):
- xen: various flaws (#1463247)
blkif responses leak backend stack data [XSA-216]
page transfer may allow PV guest to elevate privilege [XSA-217]
Races in the grant table unmap code [XSA-218]
x86: insufficient reference counts during shadow emulation [XSA-219]
x86: PKRU and BND* leakage between vCPU-s [XSA-220]
stale P2M mappings due to insufficient error checking [XSA-222]
ARM guest disabling interrupt may crash Xen [XSA-223]
grant table operations mishandle reference counts [XSA-224]
arm: vgic: Out-of-bound access when sending SGIs [XSA-225]
- NULL pointer deref in event channel poll [XSA-221] (#1463231)
|
| xen-ocaml-4.6.5-6.fc24.x86_64
[509 KiB] |
Changelog
by Michael Young (2017-05-04):
- xen: various flaws (#1447345)
x86: 64bit PV guest breakout via pagetable use-after-mode-change [XSA-213]
grant transfer allows PV guest to elevate privileges [XSA-214]
possible memory corruption via failsafe callback [XSA-215]
|
| xen-ocaml-4.6.5-5.fc24.x86_64
[509 KiB] |
Changelog
by Michael Young (2017-04-05):
- Qemu: 9pfs: host memory leakage via v9fs_create [CVE-2017-7377] (#1437873)
- x86: broken check in memory_exchange() permits PV guest breakout
[XSA-212, CVE-2017-7228] (#1438804)
|
| xen-ocaml-4.6.5-1.fc24.x86_64
[499 KiB] |
Changelog
by Michael Young (2017-03-08):
- update to xen-4.6.5
adjust xen.use.fedora.ipxe.patch, # qemu.trad.bug1399055.patch and
qemu.git-4299b90e9ba9ce5ca9024572804ba751aa1a7e70.patch
remove upstream patches
|
| xen-ocaml-4.6.4-8.fc24.x86_64
[499 KiB] |
Changelog
by Michael Young (2017-02-25):
- cirrus_bitblt_cputovideo does not check if memory region is safe
[XSA-209, CVE-2017-2620] (#1425420)
|
| xen-ocaml-4.6.4-7.fc24.x86_64
[499 KiB] |
Changelog
by Michael Young (2017-02-16):
- memory leak when destroying guest without PT devices [XSA-207] (#1422492)
- update patches for XSA-208 after upstream revision (no functional change)
|
| xen-ocaml-4.6.4-5.fc24.x86_64
[498 KiB] |
Changelog
by Michael Young (2016-12-22):
- two security flaws (#1406840)
x86 PV guests may be able to mask interrupts [XSA-202, CVE-2016-10024]
x86: missing NULL pointer check in VMFUNC emulation [XSA-203, CVE-2016-10025]
- x86: Mishandling of SYSCALL singlestep during emulation [XSA-204,
CVE-2016-10013] (#1406260)
|
| xen-ocaml-4.6.3-5.fc24.x86_64
[497 KiB] |
Changelog
by Michael Young (2016-09-08):
- x86: Disallow L3 recursive pagetable for 32-bit PV guests [XSA-185,
CVE-2016-7092] (#1374470)
- x86: Mishandling of instruction pointer truncation during emulation
[XSA-186, CVE-2016-7093] (#1374471)
- x86 HVM: Overflow of sh_ctxt->seg_reg[] [XSA-187, CVE-2016-7094] (#1374473)
|
| xen-ocaml-4.6.3-4.fc24.x86_64
[497 KiB] |
Changelog
by Michael Young (2016-07-27):
- x86: Privilege escalation in PV guests [XSA-182, CVE-2016-6258] (#1360358)
- x86: Missing SMAP whitelisting in 32-bit exception / event delivery
[XSA-183, CVE-2016-6259] (#1360359)
- virtio: unbounded memory allocation issue [XSA-184, CVE-2016-5403] (#1360831)
- Qemu: scsi: esp: OOB write access in esp_do_dma [CVE-2016-6351] (#1360599)
|
| xen-ocaml-4.6.3-2.fc24.x86_64
[497 KiB] |
Changelog
by Michael Young (2016-07-10):
- perl build requires change for F25
- allow bigger xs_watch pthread stacksize for Fedora qemu
|
| xen-ocaml-4.6.3-1.fc24.x86_64
[496 KiB] |
Changelog
by Michael Young (2016-06-23):
- update to xen-4.6.3
adjust xen.use.fedora.ipxe.patch, xen.fedora.crypt.patch
and xen.gcc6.fix.patch
remove upstream patches
|