Описание
Security update for xen
This update for xen fixes the following issues:
- bsc#1178963 - stack corruption from XSA-346 change (XSA-355)
- bsc#1178935 - CVE-2020-25723: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
- bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
- bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
- bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
- bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
Список пакетов
SUSE Linux Enterprise Server 11 SP4-LTSS
Ссылки
- Link for SUSE-SU-2020:14557-1
- E-Mail link for SUSE-SU-2020:14557-1
- SUSE Security Ratings
- SUSE Bug 1177409
- SUSE Bug 1177412
- SUSE Bug 1177413
- SUSE Bug 1177414
- SUSE Bug 1178591
- SUSE Bug 1178935
- SUSE Bug 1178963
- SUSE CVE CVE-2020-25723 page
- SUSE CVE CVE-2020-27670 page
- SUSE CVE CVE-2020-27671 page
- SUSE CVE CVE-2020-27672 page
- SUSE CVE CVE-2020-27674 page
- SUSE CVE CVE-2020-28368 page
Описание
A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
Затронутые продукты
Ссылки
- CVE-2020-25723
- SUSE Bug 1178934
- SUSE Bug 1178935
Описание
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.
Затронутые продукты
Ссылки
- CVE-2020-27670
- SUSE Bug 1177414
- SUSE Bug 1178658
- SUSE Bug 1183925
Описание
An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.
Затронутые продукты
Ссылки
- CVE-2020-27671
- SUSE Bug 1177413
- SUSE Bug 1183925
Описание
An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.
Затронутые продукты
Ссылки
- CVE-2020-27672
- SUSE Bug 1177412
- SUSE Bug 1178658
- SUSE Bug 1183925
Описание
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
Затронутые продукты
Ссылки
- CVE-2020-27674
- SUSE Bug 1177409
- SUSE Bug 1178658
Описание
Xen through 4.14.x allows guest OS administrators to obtain sensitive information (such as AES keys from outside the guest) via a side-channel attack on a power/energy monitoring interface, aka a "Platypus" attack. NOTE: there is only one logically independent fix: to change the access control for each such interface in Xen.
Затронутые продукты
Ссылки
- CVE-2020-28368
- SUSE Bug 1178591
- SUSE Bug 1178658