stable

xen-4.13.1-6.fc32

FEDORA-2020-f668e579be created by myoung 4 years ago for Fedora 32

x86 pv: Crash when handling guest access to MSR_MISC_ENABLE [XSA-333, CVE-2020-25602] (#1881619) Missing unlock in XENMEM_acquire_resource error path [XSA-334, CVE-2020-25598] (#1881616) race when migrating timers between x86 HVM vCPU-s [XSA-336, CVE-2020-25604] (#1881618) PCI passthrough code reading back hardware registers [XSA-337, CVE-2020-25595] (#1881587) once valid event channels may not turn invalid [XSA-338, CVE-2020-25597] (#1881588) x86 pv guest kernel DoS via SYSENTER [XSA-339, CVE-2020-25596] (#1881617) Missing memory barriers when accessing/allocating an event channel [XSA-340, CVE-2020-25603] (#1881583) out of bounds event channels available to 32-bit x86 domains [XSA-342, CVE-2020-25600] (#1881582) races with evtchn_reset() [XSA-343, CVE-2020-25599] (#1881581) lack of preemption in evtchn_reset() / evtchn_destroy() [XSA-344, CVE-2020-25601] (#1881586)

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2020-f668e579be

This update has been submitted for testing by myoung.

4 years ago

This update's test gating status has been changed to 'ignored'.

4 years ago

This update's test gating status has been changed to 'waiting'.

4 years ago

This update's test gating status has been changed to 'ignored'.

4 years ago

This update has been pushed to testing.

4 years ago

This update can be pushed to stable now if the maintainer wishes

4 years ago

This update has been submitted for stable by bodhi.

4 years ago

This update has been pushed to stable.

4 years ago

Please log in to add feedback.

Metadata
Type
security
Severity
high
Karma
0
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
7 days
Dates
submitted
4 years ago
in testing
4 years ago
in stable
4 years ago
BZ#1877366 CVE-2020-25603 xen: missing memory barriers when accessing/allocating an event channel (XSA-340)
0
0
BZ#1877369 CVE-2020-25595 xen: PCI passthrough code reading back hardware registers (XSA-337)
0
0
BZ#1877378 CVE-2020-25601 xen: lack of preemption in evtchn_reset() / evtchn_destroy() (XSA-344)
0
0
BZ#1877382 CVE-2020-25604 xen: race when migrating timers between x86 HVM vCPU-s (XSA-336)
0
0
BZ#1877383 CVE-2020-25598 xen: missing unlock in XENMEM_acquire_resource error path (XSA-334)
0
0
BZ#1879553 CVE-2020-25597 xen: once valid event channels may not turn invalid (XSA-338)
0
0
BZ#1879567 CVE-2020-25599 xen: races with evtchn_reset function (XSA-343)
0
0
BZ#1880137 CVE-2020-25596 xen: x86 pv guest kernel DoS via SYSENTER (XSA-339)
0
0
BZ#1880156 CVE-2020-25600 xen: out of bounds event channels available to 32-bit x86 domains (XSA-342)
0
0
BZ#1880158 CVE-2020-25602 xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333)
0
0
BZ#1881581 CVE-2020-25599 xen: races with evtchn_reset function (XSA-343) [fedora-all]
0
0
BZ#1881582 CVE-2020-25600 xen: out of bounds event channels available to 32-bit x86 domains (XSA-342) [fedora-all]
0
0
BZ#1881583 CVE-2020-25603 xen: missing memory barriers when accessing/allocating an event channel (XSA-340) [fedora-all]
0
0
BZ#1881586 CVE-2020-25601 xen: lack of preemption in evtchn_reset() / evtchn_destroy() (XSA-344) [fedora-all]
0
0
BZ#1881587 CVE-2020-25595 xen: PCI passthrough code reading back hardware registers (XSA-337) [fedora-all]
0
0
BZ#1881588 CVE-2020-25597 xen: once valid event channels may not turn invalid (XSA-338) [fedora-all]
0
0
BZ#1881616 CVE-2020-25598 xen: missing unlock in XENMEM_acquire_resource error path (XSA-334) [fedora-all]
0
0
BZ#1881617 CVE-2020-25596 xen: x86 pv guest kernel DoS via SYSENTER (XSA-339) [fedora-all]
0
0
BZ#1881618 CVE-2020-25604 xen: race when migrating timers between x86 HVM vCPU-s (XSA-336) [fedora-all]
0
0
BZ#1881619 CVE-2020-25602 xen: x86 pv: Crash when handling guest access to MSR_MISC_ENABLE (XSA-333) [fedora-all]
0
0

Automated Test Results