Security update for xen
Announcement ID: | SUSE-SU-2020:14578-1 |
---|---|
Rating: | moderate |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves eight vulnerabilities can now be installed.
Description:
This update for xen fixes the following issues:
- CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
- CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322).
- CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
- CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324).
- CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
- CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
- CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
- CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4
zypper in -t patch slessp4-xen-14578=1
-
SUSE Linux Enterprise Server 11 SP4
zypper in -t patch slessp4-xen-14578=1
Package List:
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (x86_64 i586)
- xen-tools-domU-4.4.4_48-61.61.1
- xen-libs-4.4.4_48-61.61.1
- xen-kmp-default-4.4.4_48_3.0.101_108.117-61.61.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (i586)
- xen-kmp-pae-4.4.4_48_3.0.101_108.117-61.61.1
-
SUSE Linux Enterprise Server 11 SP4 LTSS 11-SP4 (x86_64)
- xen-4.4.4_48-61.61.1
- xen-doc-html-4.4.4_48-61.61.1
- xen-tools-4.4.4_48-61.61.1
- xen-libs-32bit-4.4.4_48-61.61.1
-
SUSE Linux Enterprise Server 11 SP4 (x86_64 i586)
- xen-tools-domU-4.4.4_48-61.61.1
- xen-libs-4.4.4_48-61.61.1
- xen-kmp-default-4.4.4_48_3.0.101_108.117-61.61.1
-
SUSE Linux Enterprise Server 11 SP4 (i586)
- xen-kmp-pae-4.4.4_48_3.0.101_108.117-61.61.1
-
SUSE Linux Enterprise Server 11 SP4 (x86_64)
- xen-4.4.4_48-61.61.1
- xen-doc-html-4.4.4_48-61.61.1
- xen-tools-4.4.4_48-61.61.1
- xen-libs-32bit-4.4.4_48-61.61.1
References:
- https://www.suse.com/security/cve/CVE-2020-29130.html
- https://www.suse.com/security/cve/CVE-2020-29480.html
- https://www.suse.com/security/cve/CVE-2020-29481.html
- https://www.suse.com/security/cve/CVE-2020-29483.html
- https://www.suse.com/security/cve/CVE-2020-29484.html
- https://www.suse.com/security/cve/CVE-2020-29566.html
- https://www.suse.com/security/cve/CVE-2020-29570.html
- https://www.suse.com/security/cve/CVE-2020-29571.html
- https://bugzilla.suse.com/show_bug.cgi?id=1179477
- https://bugzilla.suse.com/show_bug.cgi?id=1179496
- https://bugzilla.suse.com/show_bug.cgi?id=1179498
- https://bugzilla.suse.com/show_bug.cgi?id=1179501
- https://bugzilla.suse.com/show_bug.cgi?id=1179502
- https://bugzilla.suse.com/show_bug.cgi?id=1179506
- https://bugzilla.suse.com/show_bug.cgi?id=1179514
- https://bugzilla.suse.com/show_bug.cgi?id=1179516