Fedora 30: xen FEDORA-2019-cbb732f760

    Date27 Nov 2019
    CategoryFedora
    372
    Posted ByLinuxSecurity Advisories
    add missing XSA-299 patches x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207] TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135] ---- VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] missing descriptor table limit checking in x86 PV emulation [XSA-298, CVE-2019-18425] Issues with restartable PV type change operations [XSA-299,
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2019-cbb732f760
    2019-11-28 01:30:37.434294
    --------------------------------------------------------------------------------
    
    Name        : xen
    Product     : Fedora 30
    Version     : 4.11.2
    Release     : 3.fc30
    URL         : http://xen.org/
    Summary     : Xen is a virtual machine monitor
    Description :
    This package contains the XenD daemon and xm command line
    tools, needed to manage virtual machines running under the
    Xen hypervisor
    
    --------------------------------------------------------------------------------
    Update Information:
    
    add missing XSA-299 patches x86: Machine Check Error on Page Size Change DoS
    [XSA-304, CVE-2018-12207] TSX Asynchronous Abort speculative side channel
    [XSA-305, CVE-2019-11135]  ----  VCPUOP_initialise DoS [XSA-296, CVE-2019-18420]
    missing descriptor table limit checking in x86 PV emulation [XSA-298,
    CVE-2019-18425] Issues with restartable PV type change operations [XSA-299,
    CVE-2019-18421] (#1767726) add-to-physmap can be abused to DoS Arm hosts
    [XSA-301, CVE-2019-18423] passed through PCI devices may corrupt host memory
    after deassignment [XSA-302, CVE-2019-18424] (#1767731) ARM: Interrupts are
    unconditionally unmasked in exception handlers [XSA-303, CVE-2019-18422]
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Tue Nov 12 2019 Michael Young  - 4.11.2-3
    - add missing XSA-299 patches
    - x86: Machine Check Error on Page Size Change DoS [XSA-304, CVE-2018-12207]
    - TSX Asynchronous Abort speculative side channel [XSA-305, CVE-2019-11135]
    * Fri Nov  1 2019 Michael Young  - 4.11.2-2
    - VCPUOP_initialise DoS [XSA-296, CVE-2019-18420] (#1771368)
    - missing descriptor table limit checking in x86 PV emulation [XSA-298,
    	CVE-2019-18425] (#1771341)
    - Issues with restartable PV type change operations [XSA-299, CVE-2019-18421]
    	(#1767726)
    - add-to-physmap can be abused to DoS Arm hosts [XSA-301, CVE-2019-18423]
    	(#1771345)
    - passed through PCI devices may corrupt host memory after deassignment
    	[XSA-302, CVE-2019-18424] (#1767731)
    - ARM: Interrupts are unconditionally unmasked in exception handlers
    	[XSA-303, CVE-2019-18422] (#1771443)
    * Mon Jul  1 2019 Michael Young  - 4.11.2-1
    - update to 4.11.2
      remove patches now fixed upstream
      adjust xen.use.fedora.ipxe.patch
      drop parts of xen.gcc9.fixes.patch
    * Sat Jun 15 2019 Michael Young  - 4.11.1-6
    - Unlimited Arm Atomics Operations [XSA-295, CVE-2019-17349,
    	CVE-2019-17350] (#1720760)
    * Tue May 14 2019 Michael Young  - 4.11.1-5
    - Microarchitectural Data Sampling speculative side channel [XSA-297,
    	CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091]
    - additional patches so above applies cleanly
    - work around grub2 issues in dom0
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1767730 - CVE-2019-18424 xen: passed through PCI devices may corrupt host memory after deassignment leading to privilege escalation
            https://bugzilla.redhat.com/show_bug.cgi?id=1767730
      [ 2 ] Bug #1771340 - CVE-2019-18425 xen: missing descriptor table limit checking in x86 PV emulation leading to privilege escalation
            https://bugzilla.redhat.com/show_bug.cgi?id=1771340
      [ 3 ] Bug #1771344 - CVE-2019-18423 xen: add-to-physmap can be abused to DoS Arm hosts
            https://bugzilla.redhat.com/show_bug.cgi?id=1771344
      [ 4 ] Bug #1771366 - CVE-2019-18420 xen: allows guest OS users to cause denial of service via VCPUOP_initialise hypercall
            https://bugzilla.redhat.com/show_bug.cgi?id=1771366
      [ 5 ] Bug #1771442 - CVE-2019-18422 xen: ARM: Interrupts are unconditionally unmasked in exception handlers
            https://bugzilla.redhat.com/show_bug.cgi?id=1771442
      [ 6 ] Bug #1765043 - CVE-2019-18421 xen: a malicious PV guest administrator may be able to escalate their privilege to that of the host
            https://bugzilla.redhat.com/show_bug.cgi?id=1765043
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2019-cbb732f760' at the command
    line. For more information, refer to the dnf documentation available at
    http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/25-what-do-you-think-of-the-linuxsecurity-privacy-news-articles?task=poll.vote&format=json
    25
    radio
    [{"id":"90","title":"Love them!","votes":"5","type":"x","order":"1","pct":100,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.