Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:3049-1

Опубликовано: 27 окт. 2020
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • bsc#1177409 - VUL-0: CVE-2020-27673: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
  • bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen mapping code (XSA-345)
  • bsc#1177413 - VUL-0: CVE-2020-27671: xen: undue deferral of IOMMU TLB flushes (XSA-346)
  • bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page table updates (XSA-347)

Список пакетов

Container suse/sles/15.2/virt-launcher:0.38.1
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Basic
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Standard
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-BYOS-Azure
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-BYOS-EC2-HVM
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-BYOS-GCE
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-CHOST-BYOS-Azure
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-CHOST-BYOS-EC2
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-CHOST-BYOS-GCE
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-EC2-ECS-HVM
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-EC2-HVM
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-GCE
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-HPC-Azure
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-HPC-BYOS-Azure
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-SAP-Azure
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-SAP-BYOS-Azure
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-SAP-BYOS-GCE
xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-SAP-EC2-HVM
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
Image SLES15-SP2-SAP-GCE
xen-libs-4.13.1_10-3.13.1
SUSE Linux Enterprise Module for Basesystem 15 SP2
xen-libs-4.13.1_10-3.13.1
xen-tools-domU-4.13.1_10-3.13.1
SUSE Linux Enterprise Module for Server Applications 15 SP2
xen-4.13.1_10-3.13.1
xen-devel-4.13.1_10-3.13.1
xen-tools-4.13.1_10-3.13.1
xen-tools-xendomains-wait-disk-4.13.1_10-3.13.1

Описание

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.


Затронутые продукты
Container suse/sles/15.2/virt-launcher:0.38.1:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Basic:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Standard:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.1_10-3.13.1

Ссылки

Описание

An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.


Затронутые продукты
Container suse/sles/15.2/virt-launcher:0.38.1:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Basic:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Standard:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.1_10-3.13.1

Ссылки

Описание

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.


Затронутые продукты
Container suse/sles/15.2/virt-launcher:0.38.1:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Basic:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Standard:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.1_10-3.13.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.


Затронутые продукты
Container suse/sles/15.2/virt-launcher:0.38.1:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Basic:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-Azure-Standard:xen-libs-4.13.1_10-3.13.1
Image SLES15-SP2-BYOS-Azure:xen-libs-4.13.1_10-3.13.1

Ссылки
Уязвимость SUSE-SU-2020:3049-1