-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2019-6aad703290 2019-12-18 01:52:04.721255 --------------------------------------------------------------------------------
Name : xen Product : Fedora 31 Version : 4.12.1 Release : 8.fc31 URL : http://xen.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor
-------------------------------------------------------------------------------- Update Information:
denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1782211) denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) -------------------------------------------------------------------------------- ChangeLog:
* Wed Dec 11 2019 Michael Young m.a.young@durham.ac.uk - 4.12.1-8 - denial of service in find_next_bit() [XSA-307, CVE-2019-19581, CVE-2019-19582] (#1780559) - denial of service in HVM/PVH guest userspace code [XSA-308, CVE-2019-19583] (#1782206) - privilege escalation due to malicious PV guest [XSA-309, CVE-2019-19578] (#1782210) - Further issues with restartable PV type change operations [XSA-310, CVE-2019-19580] (#1782207) - vulnerability in dynamic height handling for AMD IOMMU pagetables [XSA-311, CVE-2019-19577] (#1782208) - add patches needed to apply XSA-311 * Tue Nov 26 2019 Michael Young m.a.young@durham.ac.uk - 4.12.1-7 - Device quarantine for alternate pci assignment methods [XSA-306, CVE-2019-19579] (#1780559) * Tue Nov 12 2019 Michael Young m.a.young@durham.ac.uk - 4.12.1-6 - add missing XSA-299 patches * Tue Nov 12 2019 Michael Young m.a.young@durham.ac.uk - 4.12.1-5 - x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135] * Thu Oct 31 2019 Michael Young m.a.young@durham.ac.uk - 4.12.1-4 - VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368) - missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] (#1771341) - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421] (#1767726) - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423] (#1771345) - passed through PCI devices may corrupt host memory after deassignment [XSA-302, CVE-2019-18424] (#1767731) - ARM: Interrupts are unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422] (#1771443) * Thu Oct 3 2019 Miro Hron��ok mhroncok@redhat.com - 4.12.1-3 - Rebuilt for Python 3.8.0rc1 (#1748018) * Mon Aug 19 2019 Miro Hron��ok mhroncok@redhat.com - 4.12.1-2 - Rebuilt for Python 3.8 -------------------------------------------------------------------------------- References:
[ 1 ] Bug #1778171 - CVE-2019-19583 xen: denial of service in HVM/PVH guest userspace code (XSA-308) https://bugzilla.redhat.com/show_bug.cgi?id=1778171 [ 2 ] Bug #1778161 - CVE-2019-19578 xen: privilege escalation due to malicious PV guest (XSA-309) https://bugzilla.redhat.com/show_bug.cgi?id=1778161 [ 3 ] Bug #1778185 - CVE-2019-19580 xen: Further issues with restartable PV type change operations (XSA-310) https://bugzilla.redhat.com/show_bug.cgi?id=1778185 [ 4 ] Bug #1778194 - CVE-2019-19577 xen: vulnerability in dynamic height handling for AMD IOMMU pagetables (XSA-311 v2) https://bugzilla.redhat.com/show_bug.cgi?id=1778194 [ 5 ] Bug #1778191 - CVE-2019-19582 xen: denial of service in find_next_bit() (XSA-307) https://bugzilla.redhat.com/show_bug.cgi?id=1778191 --------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2019-6aad703290' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys --------------------------------------------------------------------------------