Automatic update for xen-4.14.0-5.eln103.

Changelog
* Tue Sep 22 2020 Michael Young <m.a.young@durham.ac.uk> - 4.14.0-5
- x86 pv: Crash when handling guest access to MSR_MISC_ENABLE [XSA-333,
    CVE-2020-25602]
- Missing unlock in XENMEM_acquire_resource error path [XSA-334,
    CVE-2020-25598]
- race when migrating timers between x86 HVM vCPU-s [XSA-336,
    CVE-2020-25604]
- PCI passthrough code reading back hardware registers [XSA-337,
    CVE-2020-25595]
- once valid event channels may not turn invalid [XSA-338, CVE-2020-25597]
- x86 pv guest kernel DoS via SYSENTER [XSA-339, CVE-2020-25596]
- Missing memory barriers when accessing/allocating an event channel [XSA-340,
    CVE-2020-25603]
- out of bounds event channels available to 32-bit x86 domains [XSA-342,
    CVE-2020-25600]
- races with evtchn_reset() [XSA-343, CVE-2020-25599]
- lack of preemption in evtchn_reset() / evtchn_destroy() [XSA-344,
    CVE-2020-25601]

This update was automatically created

2 years ago

This update's test gating status has been changed to 'waiting'.

2 years ago

This update's test gating status has been changed to 'ignored'.

2 years ago

This update can be pushed to stable now if the maintainer wishes

2 years ago

This update has been submitted for stable by bodhi

2 years ago

Please login to add feedback.

Metadata
Type
unspecified
Karma
0
Signed
Content Type
RPM
Test Gating
Settings
Unstable by Karma
-3
Stable by Karma
disabled
Stable by Time
0 days
Dates
submitted
2 years ago
in testing
2 years ago
in stable
2 years ago

Automated Test Results