-------------------------------------------------------------------------------- Fedora Update Notification FEDORA-2022-420bf9fc1e 2022-02-04 01:19:29.204559 -------------------------------------------------------------------------------- Name : xen Product : Fedora 35 Version : 4.15.1 Release : 5.fc35 URL : https://xen.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor -------------------------------------------------------------------------------- Update Information: frontends vulnerable to backends [XSA-376] (document change only) arm: guest_physmap_remove_page not removing the p2m mappings [XSA-393, CVE-2022-23033] (#2045044) A PV guest could DoS Xen while unmapping a grant [XSA-394, CVE-2022-23034] (#2045042) Insufficient cleanup of passed-through device IRQs [XSA-395, CVE-2022-23035] (#2045040) -------------------------------------------------------------------------------- ChangeLog: * Tue Jan 25 2022 Michael Young- 4.15.1-5 - frontends vulnerable to backends [XSA-376] (document change only) - arm: guest_physmap_remove_page not removing the p2m mappings [XSA-393, CVE-2022-23033] (#2045044) - A PV guest could DoS Xen while unmapping a grant [XSA-394, CVE-2022-23034] (#2045042) - Insufficient cleanup of passed-through device IRQs [XSA-395, CVE-2022-23035] (#2045040) -------------------------------------------------------------------------------- References: [ 1 ] Bug #2045039 - CVE-2022-23035 xen: Insufficient cleanup of passed-through device IRQs (XSA-395) https://bugzilla.redhat.com/show_bug.cgi?id=2045039 [ 2 ] Bug #2045041 - CVE-2022-23034 xen: A PV guest could DoS Xen while unmapping a grant (XSA-394) https://bugzilla.redhat.com/show_bug.cgi?id=2045041 [ 3 ] Bug #2045043 - CVE-2022-23033 xen: arm: guest_physmap_remove_page not removing the p2m mappings (XSA-393) https://bugzilla.redhat.com/show_bug.cgi?id=2045043 -------------------------------------------------------------------------------- This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2022-420bf9fc1e' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys -------------------------------------------------------------------------------- _______________________________________________ package-announce mailing list -- [email protected] To unsubscribe send an email to [email protected] Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/[email protected] Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure