-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2019-cbb732f760 2019-11-28 01:30:37.434294 --------------------------------------------------------------------------------
Name : xen Product : Fedora 30 Version : 4.11.2 Release : 3.fc30 URL : http://xen.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor
-------------------------------------------------------------------------------- Update Information:
add missing XSA-299 patches x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135] ---- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] -------------------------------------------------------------------------------- ChangeLog:
* Tue Nov 12 2019 Michael Young m.a.young@durham.ac.uk - 4.11.2-3 - add missing XSA-299 patches - x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135] * Fri Nov 1 2019 Michael Young m.a.young@durham.ac.uk - 4.11.2-2 - VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443) * Mon Jul 1 2019 Michael Young m.a.young@durham.ac.uk - 4.11.2-1 - update to 4.11.2 remove patches now fixed upstream adjust xen.use.fedora.ipxe.patch drop parts of xen.gcc9.fixes.patch * Sat Jun 15 2019 Michael Young m.a.young@durham.ac.uk - 4.11.1-6 - Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349, CVE-2019-17350] (#1720760) * Tue May 14 2019 Michael Young m.a.young@durham.ac.uk - 4.11.1-5 - Microarchitectural Data Sampling speculative side channel [XSA-297, CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091] - additional patches so above applies cleanly - work around grub2 issues in dom0 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1767730 - CVE-2019-18424 xen: passed through PCI devices may corrupt host memory after deassignment leading to privilege escalation https://bugzilla.redhat.com/show_bug.cgi?id=1767730 [ 2 ] Bug #1771340 - CVE-2019-18425 xen: missing descriptor table limit checking in x86 PV emulation leading to privilege escalation https://bugzilla.redhat.com/show_bug.cgi?id=1771340 [ 3 ] Bug #1771344 - CVE-2019-18423 xen: add-to-physmap can be abused to DoS Arm hosts https://bugzilla.redhat.com/show_bug.cgi?id=1771344 [ 4 ] Bug #1771366 - CVE-2019-18420 xen: allows guest OS users to cause denial of service via VCPUOP_initialise hypercall https://bugzilla.redhat.com/show_bug.cgi?id=1771366 [ 5 ] Bug #1771442 - CVE-2019-18422 xen: ARM: Interrupts are unconditionally unmasked in exception handlers https://bugzilla.redhat.com/show_bug.cgi?id=1771442 [ 6 ] Bug #1765043 - CVE-2019-18421 xen: a malicious PV guest administrator may be able to escalate their privilege to that of the host https://bugzilla.redhat.com/show_bug.cgi?id=1765043 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-cbb732f760' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------