Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2020:3050-1

Опубликовано: 27 окт. 2020
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • bsc#1177409 - VUL-0: CVE-2020-27673: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
  • bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen mapping code (XSA-345)
  • bsc#1177413 - VUL-0: CVE-2020-27671: xen: undue deferral of IOMMU TLB flushes (XSA-346)
  • bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page table updates (XSA-347)

Список пакетов

Image SLES12-SP5-EC2-BYOS
xen-libs-4.12.3_10-3.27.1
xen-tools-domU-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand
xen-libs-4.12.3_10-3.27.1
xen-tools-domU-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-On-Demand
xen-libs-4.12.3_10-3.27.1
xen-tools-domU-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-SAP-BYOS
xen-libs-4.12.3_10-3.27.1
xen-tools-domU-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-SAP-On-Demand
xen-libs-4.12.3_10-3.27.1
xen-tools-domU-4.12.3_10-3.27.1
SUSE Linux Enterprise Server 12 SP5
xen-4.12.3_10-3.27.1
xen-doc-html-4.12.3_10-3.27.1
xen-libs-4.12.3_10-3.27.1
xen-libs-32bit-4.12.3_10-3.27.1
xen-tools-4.12.3_10-3.27.1
xen-tools-domU-4.12.3_10-3.27.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5
xen-4.12.3_10-3.27.1
xen-doc-html-4.12.3_10-3.27.1
xen-libs-4.12.3_10-3.27.1
xen-libs-32bit-4.12.3_10-3.27.1
xen-tools-4.12.3_10-3.27.1
xen-tools-domU-4.12.3_10-3.27.1
SUSE Linux Enterprise Software Development Kit 12 SP5
xen-devel-4.12.3_10-3.27.1

Описание

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.3_10-3.27.1

Ссылки

Описание

An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.3_10-3.27.1

Ссылки

Описание

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.3_10-3.27.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.


Затронутые продукты
Image SLES12-SP5-EC2-BYOS:xen-libs-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-BYOS:xen-tools-domU-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-libs-4.12.3_10-3.27.1
Image SLES12-SP5-EC2-ECS-On-Demand:xen-tools-domU-4.12.3_10-3.27.1

Ссылки
Уязвимость SUSE-SU-2020:3050-1