MGASA-2013-0197

Source
https://advisories.mageia.org/MGASA-2013-0197.html
Import Source
https://advisories.mageia.org/MGASA-2013-0197.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2013-0197
Related
Published
2013-07-01T19:17:22Z
Modified
2013-07-01T19:17:10Z
Summary
Updated xen package fixes security issues
Details

This update fixes the following security issues: XSA-52/CVE-2013-2076: Information leak on XSAVE/XRSTOR capable AMD CPUs XSA-53/CVE-2013-2077: Hypervisor crash due to missing exception recovery on XRSTOR XSA-54/CVE-2013-2078: Hypervisor crash due to missing exception recovery on XSETBV XSA-55/CVE-2013-2194: integer overflows XSA-55/CVE-2013-2195: pointer dereferences XSA-55/CVE-2013-2196: other problems XSA-56/CVE-2013-2072: Buffer overflow in xencontrol Python bindings affecting xend XSA-57/CVE-2013-2211: libxl allows guest write access to sensitive console related xenstore keys XSA-58/CVE-2013-1432: Page reference counting error due to XSA-45/CVE-2013-1918 fixes

References
Credits

Affected packages

Mageia:3 / xen

Package

Name
xen
Purl
pkg:rpm/mageia/xen?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.2.1-16.2.mga3

Ecosystem specific

{
    "section": "core"
}