Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2020:1783-1

Опубликовано: 30 окт. 2020
Источник: suse-cvrf

Описание

Security update for xen

This update for xen fixes the following issues:

  • bsc#1177409 - VUL-0: CVE-2020-27673: xen: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
  • bsc#1177412 - VUL-0: CVE-2020-27672: xen: Race condition in Xen mapping code (XSA-345)
  • bsc#1177413 - VUL-0: CVE-2020-27671: xen: undue deferral of IOMMU TLB flushes (XSA-346)
  • bsc#1177414 - VUL-0: CVE-2020-27670: xen: unsafe AMD IOMMU page table updates (XSA-347)

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Список пакетов

openSUSE Leap 15.2
xen-4.13.1_10-lp152.2.12.1
xen-devel-4.13.1_10-lp152.2.12.1
xen-doc-html-4.13.1_10-lp152.2.12.1
xen-libs-4.13.1_10-lp152.2.12.1
xen-libs-32bit-4.13.1_10-lp152.2.12.1
xen-tools-4.13.1_10-lp152.2.12.1
xen-tools-domU-4.13.1_10-lp152.2.12.1
xen-tools-xendomains-wait-disk-4.13.1_10-lp152.2.12.1

Описание

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because an AMD IOMMU page-table entry can be half-updated.


Затронутые продукты
openSUSE Leap 15.2:xen-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-devel-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-doc-html-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-libs-32bit-4.13.1_10-lp152.2.12.1

Ссылки

Описание

An issue was discovered in Xen through 4.14.x allowing x86 HVM and PVH guest OS users to cause a denial of service (data corruption), cause a data leak, or possibly gain privileges because coalescing of per-page IOMMU TLB flushes is mishandled.


Затронутые продукты
openSUSE Leap 15.2:xen-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-devel-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-doc-html-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-libs-32bit-4.13.1_10-lp152.2.12.1

Ссылки

Описание

An issue was discovered in Xen through 4.14.x allowing x86 guest OS users to cause a host OS denial of service, achieve data corruption, or possibly gain privileges by exploiting a race condition that leads to a use-after-free involving 2MiB and 1GiB superpages.


Затронутые продукты
openSUSE Leap 15.2:xen-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-devel-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-doc-html-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-libs-32bit-4.13.1_10-lp152.2.12.1

Ссылки

Описание

An issue was discovered in the Linux kernel through 5.9.1, as used with Xen through 4.14.x. Guest OS users can cause a denial of service (host OS hang) via a high rate of events to dom0, aka CID-e99502f76271.


Затронутые продукты
openSUSE Leap 15.2:xen-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-devel-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-doc-html-4.13.1_10-lp152.2.12.1
openSUSE Leap 15.2:xen-libs-32bit-4.13.1_10-lp152.2.12.1

Ссылки