SUSE-SU-2020:14578-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2020:14578-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2020:14578-1
Related
Published
2020-12-16T16:52:35Z
Modified
2020-12-16T16:52:35Z
Summary
Security update for xen
Details

This update for xen fixes the following issues:

  • CVE-2020-29480: Fixed an issue which could have allowed leak of non-sensitive data to administrator guests (bsc#117949 XSA-115).
  • CVE-2020-29481: Fixed an issue which could have allowd to new domains to inherit existing node permissions (bsc#1179498 XSA-322).
  • CVE-2020-29483: Fixed an issue where guests could disturb domain cleanup (bsc#1179502 XSA-325).
  • CVE-2020-29484: Fixed an issue where guests could crash xenstored via watchs (bsc#1179501 XSA-324).
  • CVE-2020-29566: Fixed an undue recursion in x86 HVM context switch code (bsc#1179506 XSA-348).
  • CVE-2020-29570: Fixed an issue where FIFO event channels control block related ordering (bsc#1179514 XSA-358).
  • CVE-2020-29571: Fixed an issue where FIFO event channels control structure ordering (bsc#1179516 XSA-359).
  • CVE-2020-29130: Fixed an out-of-bounds access while processing ARP packets (bsc#1179477).
References

Affected packages

SUSE:Linux Enterprise Server 11 SP4-LTSS / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.4_48-61.61.1

Ecosystem specific

{
    "binaries": [
        {
            "xen-kmp-pae": "4.4.4_48_3.0.101_108.117-61.61.1",
            "xen-tools-domU": "4.4.4_48-61.61.1",
            "xen-kmp-default": "4.4.4_48_3.0.101_108.117-61.61.1",
            "xen-libs": "4.4.4_48-61.61.1",
            "xen-doc-html": "4.4.4_48-61.61.1",
            "xen-libs-32bit": "4.4.4_48-61.61.1",
            "xen-tools": "4.4.4_48-61.61.1",
            "xen": "4.4.4_48-61.61.1"
        }
    ]
}