--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2019-376ec5c107
2019-11-19 01:34:22.736443
--------------------------------------------------------------------------------
Name : xen
Product : Fedora 31
Version : 4.12.1
Release : 6.fc31
URL :
http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
--------------------------------------------------------------------------------
Update Information:
add missing XSA-299 patches ---- x86: Machine Check Error on Page Size Change
DoS [XSA-304, CVE-2018-12207] TSX Asynchronous Abort speculative side channel
[XSA-305, CVE-2019-11135] ---- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420]
missing descriptor table limit checking in x86 PV emulation [XSA-298,
CVE-2019-18425] Issues with restartable PV type change operations [XSA-299,
CVE-2019-18421] add-to-physmap can be abused to DoS Arm hosts [XSA-301,
CVE-2019-18423] passed through PCI devices may corrupt host memory after
deassignment [XSA-302, CVE-2019-18424] ARM: Interrupts are unconditionally
unmasked in exception handlers [XSA-303, CVE-2019-18422]
--------------------------------------------------------------------------------
ChangeLog:
* Tue Nov 12 2019 Michael Young <m.a.young(a)durham.ac.uk> - 4.12.1-6
- add missing XSA-299 patches
* Tue Nov 12 2019 Michael Young <m.a.young(a)durham.ac.uk> - 4.12.1-5
- x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207]
- TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]
* Thu Oct 31 2019 Michael Young <m.a.young(a)durham.ac.uk> - 4.12.1-4
- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368)
- missing descriptor table limit checking in x86 PV emulation [XSA-298,
CVE-2019-18425] (#1771341)
- Issues with restartable PV type change operations [XSA-299, CVE-2019-18421]
(#1767726)
- add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423]
(#1771345)
- passed through PCI devices may corrupt host memory after deassignment
[XSA-302, CVE-2019-18424] (#1767731)
- ARM: Interrupts are unconditionally unmasked in exception handlers
[XSA-303, CVE-2019-18422] (#1771443)
* Thu Oct 3 2019 Miro Hron��ok <mhroncok(a)redhat.com> - 4.12.1-3
- Rebuilt for Python 3.8.0rc1 (#1748018)
* Mon Aug 19 2019 Miro Hron��ok <mhroncok(a)redhat.com> - 4.12.1-2
- Rebuilt for Python 3.8
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #1771340 - CVE-2019-18425 xen: missing descriptor table limit checking in x86
PV emulation leading to privilege escalation
https://bugzilla.redhat.com/show_bug.cgi?id=1771340
[ 2 ] Bug #1771344 - CVE-2019-18423 xen: add-to-physmap can be abused to DoS Arm hosts
https://bugzilla.redhat.com/show_bug.cgi?id=1771344
[ 3 ] Bug #1771366 - CVE-2019-18420 xen: allows guest OS users to cause denial of
service via VCPUOP_initialise hypercall
https://bugzilla.redhat.com/show_bug.cgi?id=1771366
[ 4 ] Bug #1771442 - CVE-2019-18422 xen: ARM: Interrupts are unconditionally unmasked in
exception handlers
https://bugzilla.redhat.com/show_bug.cgi?id=1771442
[ 5 ] Bug #1767730 - CVE-2019-18424 xen: passed through PCI devices may corrupt host
memory after deassignment leading to privilege escalation
https://bugzilla.redhat.com/show_bug.cgi?id=1767730
[ 6 ] Bug #1765043 - CVE-2019-18421 xen: a malicious PV guest administrator may be able
to escalate their privilege to that of the host
https://bugzilla.redhat.com/show_bug.cgi?id=1765043
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2019-376ec5c107' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------