Mehrere Probleme in xen
ID: | SUSE-SU-2020:1139-1 |
Distribution: | SUSE |
Plattformen: | SUSE Linux Enterprise Server 12-SP5, SUSE Linux Enterprise Software Development Kit 12-SP5 |
Datum: | Do, 30. April 2020, 07:21 |
Referenzen: | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11739
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11742 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11740 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11741 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-11743 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7211 |
Applikationen: | Xen |
Originalnachricht |
|
SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2020:1139-1 Rating: important References: #1027519 #1134506 #1155200 #1157490 #1160932 #1161181 #1162040 #1165206 #1167007 #1167152 #1168140 #1168142 #1168143 #1169392 Cross-References: CVE-2020-11739 CVE-2020-11740 CVE-2020-11741 CVE-2020-11742 CVE-2020-11743 CVE-2020-7211 Affected Products: SUSE Linux Enterprise Software Development Kit 12-SP5 SUSE Linux Enterprise Server 12-SP5 ______________________________________________________________________________ An update that solves 6 vulnerabilities and has 8 fixes is now available. Description: This update for xen to version 4.12.2 fixes the following issues: Security issues fixed: - CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392). - CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140). - CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142). - CVE-2020-11743: Bad error path in GNTTABOP_map_grant (bsc#1168143). - CVE-2020-7211: Fixed potential directory traversal using relative paths via tftp server on Windows host (bsc#1161181). - arm: a CPU may speculate past the ERET instruction (bsc#1160932). Non-security issues fixed: - Xenstored Crashed during VM install (bsc#1167152) - DomU hang: soft lockup CPU #0 stuck under high load (bsc#1165206, bsc#1134506) - Update API compatibility versions, fixes issues for libvirt. (bsc#1167007, bsc#1157490) - aacraid blocks xen commands (bsc#1155200) - Problems Booting Fedora31 VM on sles15 sp1 Xen Dom0 (bsc#1162040). Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Software Development Kit 12-SP5: zypper in -t patch SUSE-SLE-SDK-12-SP5-2020-1139=1 - SUSE Linux Enterprise Server 12-SP5: zypper in -t patch SUSE-SLE-SERVER-12-SP5-2020-1139=1 Package List: - SUSE Linux Enterprise Software Development Kit 12-SP5 (aarch64 x86_64): xen-debugsource-4.12.2_04-3.11.1 xen-devel-4.12.2_04-3.11.1 - SUSE Linux Enterprise Server 12-SP5 (x86_64): xen-4.12.2_04-3.11.1 xen-debugsource-4.12.2_04-3.11.1 xen-doc-html-4.12.2_04-3.11.1 xen-libs-32bit-4.12.2_04-3.11.1 xen-libs-4.12.2_04-3.11.1 xen-libs-debuginfo-32bit-4.12.2_04-3.11.1 xen-libs-debuginfo-4.12.2_04-3.11.1 xen-tools-4.12.2_04-3.11.1 xen-tools-debuginfo-4.12.2_04-3.11.1 xen-tools-domU-4.12.2_04-3.11.1 xen-tools-domU-debuginfo-4.12.2_04-3.11.1 References: https://www.suse.com/security/cve/CVE-2020-11739.html https://www.suse.com/security/cve/CVE-2020-11740.html https://www.suse.com/security/cve/CVE-2020-11741.html https://www.suse.com/security/cve/CVE-2020-11742.html https://www.suse.com/security/cve/CVE-2020-11743.html https://www.suse.com/security/cve/CVE-2020-7211.html https://bugzilla.suse.com/1027519 https://bugzilla.suse.com/1134506 https://bugzilla.suse.com/1155200 https://bugzilla.suse.com/1157490 https://bugzilla.suse.com/1160932 https://bugzilla.suse.com/1161181 https://bugzilla.suse.com/1162040 https://bugzilla.suse.com/1165206 https://bugzilla.suse.com/1167007 https://bugzilla.suse.com/1167152 https://bugzilla.suse.com/1168140 https://bugzilla.suse.com/1168142 https://bugzilla.suse.com/1168143 https://bugzilla.suse.com/1169392 _______________________________________________ sle-security-updates mailing list sle-security-updates@lists.suse.com http://lists.suse.com/mailman/listinfo/sle-security-updates |