--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-420bf9fc1e
2022-02-04 01:19:29.204559
--------------------------------------------------------------------------------

Name        : xen
Product     : Fedora 35
Version     : 4.15.1
Release     : 5.fc35
URL         : https://xen.org/
Summary     : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

--------------------------------------------------------------------------------
Update Information:

frontends vulnerable to backends [XSA-376] (document change only) arm:
guest_physmap_remove_page not removing the p2m mappings [XSA-393,
CVE-2022-23033] (#2045044) A PV guest could DoS Xen while unmapping a grant
[XSA-394, CVE-2022-23034] (#2045042) Insufficient cleanup of passed-through
device IRQs [XSA-395, CVE-2022-23035] (#2045040)
--------------------------------------------------------------------------------
ChangeLog:

* Tue Jan 25 2022 Michael Young  - 4.15.1-5
- frontends vulnerable to backends [XSA-376] (document change only)
- arm: guest_physmap_remove_page not removing the p2m mappings [XSA-393,
	CVE-2022-23033] (#2045044)
- A PV guest could DoS Xen while unmapping a grant [XSA-394, CVE-2022-23034]
	(#2045042)
- Insufficient cleanup of passed-through device IRQs [XSA-395,
	CVE-2022-23035] (#2045040)
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #2045039 - CVE-2022-23035 xen: Insufficient cleanup of passed-through device IRQs (XSA-395)
        https://bugzilla.redhat.com/show_bug.cgi?id=2045039
  [ 2 ] Bug #2045041 - CVE-2022-23034 xen: A PV guest could DoS Xen while unmapping a grant (XSA-394)
        https://bugzilla.redhat.com/show_bug.cgi?id=2045041
  [ 3 ] Bug #2045043 - CVE-2022-23033 xen: arm: guest_physmap_remove_page not removing the p2m mappings (XSA-393)
        https://bugzilla.redhat.com/show_bug.cgi?id=2045043
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-420bf9fc1e' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure