You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa xen

Sigurnosni nedostaci programskog paketa xen

——————————————————————————–
Fedora Update Notification
FEDORA-2019-cbb732f760
2019-11-28 01:30:37.434294
——————————————————————————–

Name : xen
Product : Fedora 30
Version : 4.11.2
Release : 3.fc30
URL : http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

——————————————————————————–
Update Information:

add missing XSA-299 patches x86: Machine Check Error on Page Size Change DoS
[XSA-304, CVE-2018-12207] TSX Asynchronous Abort speculative side channel
[XSA-305, CVE-2019-11135] —- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420]
missing descriptor table limit checking in x86 PV emulation [XSA-298,
CVE-2019-18425] Issues with restartable PV type change operations [XSA-299,
CVE-2019-18421] (#1767726) add-to-physmap can be abused to DoS Arm hosts
[XSA-301, CVE-2019-18423] passed through PCI devices may corrupt host memory
after deassignment [XSA-302, CVE-2019-18424] (#1767731) ARM: Interrupts are
unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422]
——————————————————————————–
ChangeLog:

* Tue Nov 12 2019 Michael Young <m.a.young@durham.ac.uk> – 4.11.2-3
– add missing XSA-299 patches
– x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207]
– TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]
* Fri Nov 1 2019 Michael Young <m.a.young@durham.ac.uk> – 4.11.2-2
– VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368)
– missing descriptor table limit checking in x86 PV emulation [XSA-298,
CVE-2019-18425] (#1771341)
– Issues with restartable PV type change operations [XSA-299, CVE-2019-18421]
(#1767726)
– add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423]
(#1771345)
– passed through PCI devices may corrupt host memory after deassignment
[XSA-302, CVE-2019-18424] (#1767731)
– ARM: Interrupts are unconditionally unmasked in exception handlers
[XSA-303, CVE-2019-18422] (#1771443)
* Mon Jul 1 2019 Michael Young <m.a.young@durham.ac.uk> – 4.11.2-1
– update to 4.11.2
remove patches now fixed upstream
adjust xen.use.fedora.ipxe.patch
drop parts of xen.gcc9.fixes.patch
* Sat Jun 15 2019 Michael Young <m.a.young@durham.ac.uk> – 4.11.1-6
– Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349,
CVE-2019-17350] (#1720760)
* Tue May 14 2019 Michael Young <m.a.young@durham.ac.uk> – 4.11.1-5
– Microarchitectural Data Sampling speculative side channel [XSA-297,
CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091]
– additional patches so above applies cleanly
– work around grub2 issues in dom0
——————————————————————————–
References:

[ 1 ] Bug #1767730 – CVE-2019-18424 xen: passed through PCI devices may corrupt host memory after deassignment leading to privilege escalation
https://bugzilla.redhat.com/show_bug.cgi?id=1767730
[ 2 ] Bug #1771340 – CVE-2019-18425 xen: missing descriptor table limit checking in x86 PV emulation leading to privilege escalation
https://bugzilla.redhat.com/show_bug.cgi?id=1771340
[ 3 ] Bug #1771344 – CVE-2019-18423 xen: add-to-physmap can be abused to DoS Arm hosts
https://bugzilla.redhat.com/show_bug.cgi?id=1771344
[ 4 ] Bug #1771366 – CVE-2019-18420 xen: allows guest OS users to cause denial of service via VCPUOP_initialise hypercall
https://bugzilla.redhat.com/show_bug.cgi?id=1771366
[ 5 ] Bug #1771442 – CVE-2019-18422 xen: ARM: Interrupts are unconditionally unmasked in exception handlers
https://bugzilla.redhat.com/show_bug.cgi?id=1771442
[ 6 ] Bug #1765043 – CVE-2019-18421 xen: a malicious PV guest administrator may be able to escalate their privilege to that of the host
https://bugzilla.redhat.com/show_bug.cgi?id=1765043
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade –advisory FEDORA-2019-cbb732f760’ at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org

Top
More in Preporuke
Sigurnosni nedostatak programskog paketa mod_auth_mellon

Otkriven je sigurnosni nedostatak u programskom paketu mod_auth_mellon za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim udaljenim napadačima omogućuje preusmjeravanje korisnika...

Close