Fedora 32: xen 2020-fbc13516af

    Date 15 Jul 2020
    178
    Posted By LinuxSecurity Advisories
    incorrect error handling in event channel port allocation leads to DoS [XSA-317, CVE-2020-15566] (#1854465) inverted code paths in x86 dirty VRAM tracking leads to DoS [XSA-319, CVE-2020-15563] (#1854463) xen: insufficient cache write-back under VT-d leads to DoS [XSA-321, CVE-2020-15565] (#1854467) missing alignment check in VCPUOP_register_vcpu_info leads to DoS [XSA-327, CVE-2020-15564]
    --------------------------------------------------------------------------------
    Fedora Update Notification
    FEDORA-2020-fbc13516af
    2020-07-16 01:13:06.320213
    --------------------------------------------------------------------------------
    
    Name        : xen
    Product     : Fedora 32
    Version     : 4.13.1
    Release     : 4.fc32
    URL         : https://xen.org/
    Summary     : Xen is a virtual machine monitor
    Description :
    This package contains the XenD daemon and xm command line
    tools, needed to manage virtual machines running under the
    Xen hypervisor
    
    --------------------------------------------------------------------------------
    Update Information:
    
    incorrect error handling in event channel port allocation leads to DoS [XSA-317,
    CVE-2020-15566] (#1854465) inverted code paths in x86 dirty VRAM tracking leads
    to DoS [XSA-319, CVE-2020-15563] (#1854463) xen: insufficient cache write-back
    under VT-d leads to DoS [XSA-321, CVE-2020-15565] (#1854467) missing alignment
    check in VCPUOP_register_vcpu_info leads to DoS [XSA-327, CVE-2020-15564]
    (#1854458) non-atomic modification of live EPT PTE leads to DoS [XSA-328,
    CVE-2020-15567] (#1854464)
    --------------------------------------------------------------------------------
    ChangeLog:
    
    * Tue Jul  7 2020 Michael Young  - 4.13.1-4
    - incorrect error handling in event channel port allocation leads to
    	DoS [XSA-317, CVE-2020-15566] (#1854465)
    - inverted code paths in x86 dirty VRAM tracking leads to DoS
    	[XSA-319, CVE-2020-15563] (#1854463)
    - xen: insufficient cache write-back under VT-d leads to DoS
    	[XSA-321, CVE-2020-15565] (#1854467)
    - missing alignment check in VCPUOP_register_vcpu_info leads to DoS
    	[XSA-327, CVE-2020-15564] (#1854458)
    - non-atomic modification of live EPT PTE leads to DoS
    	[XSA-328, CVE-2020-15567] (#1854464)
    * Tue Jun 30 2020 Jeff Law 
    Disable LTO
    --------------------------------------------------------------------------------
    References:
    
      [ 1 ] Bug #1851470 - CVE-2020-15564 xen: missing alignment check in VCPUOP_register_vcpu_info leads to DoS (XSA-327)
            https://bugzilla.redhat.com/show_bug.cgi?id=1851470
      [ 2 ] Bug #1851471 - CVE-2020-15563 xen: inverted code paths in x86 dirty VRAM tracking leads to DoS (XSA-319)
            https://bugzilla.redhat.com/show_bug.cgi?id=1851471
      [ 3 ] Bug #1851472 - CVE-2020-15567 xen: non-atomic modification of live EPT PTE leads to DoS (XSA-328)
            https://bugzilla.redhat.com/show_bug.cgi?id=1851472
      [ 4 ] Bug #1851474 - CVE-2020-15566 xen: incorrect error handling in event channel port allocation leads to DoS (XSA-317)
            https://bugzilla.redhat.com/show_bug.cgi?id=1851474
      [ 5 ] Bug #1851475 - CVE-2020-15565 xen: insufficient cache write-back under VT-d leads to DoS (XSA-321)
            https://bugzilla.redhat.com/show_bug.cgi?id=1851475
    --------------------------------------------------------------------------------
    
    This update can be installed with the "dnf" update program. Use
    su -c 'dnf upgrade --advisory FEDORA-2020-fbc13516af' at the command
    line. For more information, refer to the dnf documentation available at
    https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
    
    All packages are signed with the Fedora Project GPG key. More details on the
    GPG keys used by the Fedora Project can be found at
    https://fedoraproject.org/keys
    --------------------------------------------------------------------------------
    _______________________________________________
    package-announce mailing list -- This email address is being protected from spambots. You need JavaScript enabled to view it.
    To unsubscribe send an email to This email address is being protected from spambots. You need JavaScript enabled to view it.
    Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
    List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
    List Archives: https://lists.fedoraproject.org/archives/list/This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"7","type":"x","order":"1","pct":70,"resources":[]},{"id":"121","title":"No ","votes":"3","type":"x","order":"2","pct":30,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.