|
|
Subscribe / Log in / New account

SUSE alert SUSE-SU-2020:3916-1 (xen)

From:  sle-security-updates@lists.suse.com
To:  sle-security-updates@lists.suse.com
Subject:  SUSE-SU-2020:3916-1: moderate: Security update for xen
Date:  Tue, 22 Dec 2020 18:21:53 +0100
Message-ID:  <20201222172153.69076FEDA@maintenance.suse.de>

SUSE Security Update: Security update for xen ______________________________________________________________________________ Announcement ID: SUSE-SU-2020:3916-1 Rating: moderate References: #1027519 #1176782 #1179496 #1179498 #1179501 #1179502 #1179506 #1179514 #1179516 Cross-References: CVE-2020-29480 CVE-2020-29481 CVE-2020-29483 CVE-2020-29484 CVE-2020-29566 CVE-2020-29570 CVE-2020-29571 Affected Products: SUSE Linux Enterprise Server for SAP 15 SUSE Linux Enterprise High Performance Computing 15-LTSS SUSE Linux Enterprise High Performance Computing 15-ESPOS ______________________________________________________________________________ An update that solves 7 vulnerabilities and has two fixes is now available. Description: This update for xen fixes the following issues: - CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115). - CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322). - CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325). - CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324). - CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348). - CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358). - CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359). - Fixed an issue where dump-core shows missing nr_pages during core (bsc#1176782). - Multiple other bugs (bsc#1027519) Patch Instructions: To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: - SUSE Linux Enterprise Server for SAP 15: zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2020-3916=1 - SUSE Linux Enterprise High Performance Computing 15-LTSS: zypper in -t patch SUSE-SLE-Product-HPC-15-2020-3916=1 - SUSE Linux Enterprise High Performance Computing 15-ESPOS: zypper in -t patch SUSE-SLE-Product-HPC-15-2020-3916=1 Package List: - SUSE Linux Enterprise Server for SAP 15 (x86_64): xen-4.10.4_24-3.53.1 xen-debugsource-4.10.4_24-3.53.1 xen-devel-4.10.4_24-3.53.1 xen-libs-4.10.4_24-3.53.1 xen-libs-debuginfo-4.10.4_24-3.53.1 xen-tools-4.10.4_24-3.53.1 xen-tools-debuginfo-4.10.4_24-3.53.1 xen-tools-domU-4.10.4_24-3.53.1 xen-tools-domU-debuginfo-4.10.4_24-3.53.1 - SUSE Linux Enterprise High Performance Computing 15-LTSS (x86_64): xen-4.10.4_24-3.53.1 xen-debugsource-4.10.4_24-3.53.1 xen-devel-4.10.4_24-3.53.1 xen-libs-4.10.4_24-3.53.1 xen-libs-debuginfo-4.10.4_24-3.53.1 xen-tools-4.10.4_24-3.53.1 xen-tools-debuginfo-4.10.4_24-3.53.1 xen-tools-domU-4.10.4_24-3.53.1 xen-tools-domU-debuginfo-4.10.4_24-3.53.1 - SUSE Linux Enterprise High Performance Computing 15-ESPOS (x86_64): xen-4.10.4_24-3.53.1 xen-debugsource-4.10.4_24-3.53.1 xen-devel-4.10.4_24-3.53.1 xen-libs-4.10.4_24-3.53.1 xen-libs-debuginfo-4.10.4_24-3.53.1 xen-tools-4.10.4_24-3.53.1 xen-tools-debuginfo-4.10.4_24-3.53.1 xen-tools-domU-4.10.4_24-3.53.1 xen-tools-domU-debuginfo-4.10.4_24-3.53.1 References: https://www.suse.com/security/cve/CVE-2020-29480.html https://www.suse.com/security/cve/CVE-2020-29481.html https://www.suse.com/security/cve/CVE-2020-29483.html https://www.suse.com/security/cve/CVE-2020-29484.html https://www.suse.com/security/cve/CVE-2020-29566.html https://www.suse.com/security/cve/CVE-2020-29570.html https://www.suse.com/security/cve/CVE-2020-29571.html https://bugzilla.suse.com/1027519 https://bugzilla.suse.com/1176782 https://bugzilla.suse.com/1179496 https://bugzilla.suse.com/1179498 https://bugzilla.suse.com/1179501 https://bugzilla.suse.com/1179502 https://bugzilla.suse.com/1179506 https://bugzilla.suse.com/1179514 https://bugzilla.suse.com/1179516


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds