SUSE-SU-2020:14557-1

Source
https://www.suse.com/support/update/announcement/2020/suse-su-202014557-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:14557-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2020:14557-1
Related
Published
2020-12-08T11:11:49Z
Modified
2020-12-08T11:11:49Z
Summary
Security update for xen
Details

This update for xen fixes the following issues:

  • bsc#1178963 - stack corruption from XSA-346 change (XSA-355)
  • bsc#1178935 - CVE-2020-25723: assertion failure through usbpacketunmap() in hw/usb/hcd-ehci.c
  • bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries (XSA-286)
  • bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code (XSA-345)
  • bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes (XSA-346)
  • bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates (XSA-347)
  • bsc#1178591 - CVE-2020-28368: Intel RAPL sidechannel attack aka PLATYPUS attack aka XSA-351
References

Affected packages

SUSE:Linux Enterprise Server 11 SP4-LTSS / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.4_46-61.58.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-kmp-pae": "4.4.4_46_3.0.101_108.117-61.58.1",
            "xen-tools-domU": "4.4.4_46-61.58.1",
            "xen-kmp-default": "4.4.4_46_3.0.101_108.117-61.58.1",
            "xen-libs": "4.4.4_46-61.58.1",
            "xen-doc-html": "4.4.4_46-61.58.1",
            "xen-libs-32bit": "4.4.4_46-61.58.1",
            "xen-tools": "4.4.4_46-61.58.1",
            "xen": "4.4.4_46-61.58.1"
        }
    ]
}