Automatic update for xen-4.14.0-5.fc34.
* Tue Sep 22 2020 Michael Young <m.a.young@durham.ac.uk> - 4.14.0-5
- x86 pv: Crash when handling guest access to MSR_MISC_ENABLE [XSA-333,
CVE-2020-25602]
- Missing unlock in XENMEM_acquire_resource error path [XSA-334,
CVE-2020-25598]
- race when migrating timers between x86 HVM vCPU-s [XSA-336,
CVE-2020-25604]
- PCI passthrough code reading back hardware registers [XSA-337,
CVE-2020-25595]
- once valid event channels may not turn invalid [XSA-338, CVE-2020-25597]
- x86 pv guest kernel DoS via SYSENTER [XSA-339, CVE-2020-25596]
- Missing memory barriers when accessing/allocating an event channel [XSA-340,
CVE-2020-25603]
- out of bounds event channels available to 32-bit x86 domains [XSA-342,
CVE-2020-25600]
- races with evtchn_reset() [XSA-343, CVE-2020-25599]
- lack of preemption in evtchn_reset() / evtchn_destroy() [XSA-344,
CVE-2020-25601]
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2020-c1a01eacf5
Please log in to add feedback.
This update was automatically created
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'ignored'.
This update can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by bodhi