Gentoo Archives: gentoo-announce

From: glsamaker@g.o
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 202208-23 ] Xen: Multiple Vulnerabilities
Date: Sun, 14 Aug 2022 16:10:09
Message-Id: 166048732940.12.933986051810180370@7b72ab9f548d
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 202208-23
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 https://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: Xen: Multiple Vulnerabilities
9 Date: August 14, 2022
10 Bugs: #810341, #812485, #816882, #825354, #832039, #835401, #850802
11 ID: 202208-23
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been discovered in Xen, the worst of which
19 could result in remote code execution (guest sandbox escape).
20
21 Background
22 ==========
23
24 Xen is a bare-metal hypervisor.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 app-emulation/xen < 4.15.3 >= 4.15.3
33 2 app-emulation/xen-tools < 4.15.3 >= 4.15.3
34
35 Description
36 ===========
37
38 Multiple vulnerabilities have been discovered in Xen. Please review the
39 CVE identifiers referenced below for details.
40
41 Impact
42 ======
43
44 Please review the referenced CVE identifiers for details.
45
46 Workaround
47 ==========
48
49 There is no known workaround at this time.
50
51 Resolution
52 ==========
53
54 All Xen users should upgrade to the latest version:
55
56 # emerge --sync
57 # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.15.3"
58
59 All Xen tools users should upgrade to the latest version:
60
61 # emerge --sync
62 # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.15.3"
63
64 References
65 ==========
66
67 [ 1 ] CVE-2021-28694
68 https://nvd.nist.gov/vuln/detail/CVE-2021-28694
69 [ 2 ] CVE-2021-28695
70 https://nvd.nist.gov/vuln/detail/CVE-2021-28695
71 [ 3 ] CVE-2021-28696
72 https://nvd.nist.gov/vuln/detail/CVE-2021-28696
73 [ 4 ] CVE-2021-28697
74 https://nvd.nist.gov/vuln/detail/CVE-2021-28697
75 [ 5 ] CVE-2021-28698
76 https://nvd.nist.gov/vuln/detail/CVE-2021-28698
77 [ 6 ] CVE-2021-28699
78 https://nvd.nist.gov/vuln/detail/CVE-2021-28699
79 [ 7 ] CVE-2021-28700
80 https://nvd.nist.gov/vuln/detail/CVE-2021-28700
81 [ 8 ] CVE-2021-28701
82 https://nvd.nist.gov/vuln/detail/CVE-2021-28701
83 [ 9 ] CVE-2021-28702
84 https://nvd.nist.gov/vuln/detail/CVE-2021-28702
85 [ 10 ] CVE-2021-28710
86 https://nvd.nist.gov/vuln/detail/CVE-2021-28710
87 [ 11 ] CVE-2022-21123
88 https://nvd.nist.gov/vuln/detail/CVE-2022-21123
89 [ 12 ] CVE-2022-21125
90 https://nvd.nist.gov/vuln/detail/CVE-2022-21125
91 [ 13 ] CVE-2022-21166
92 https://nvd.nist.gov/vuln/detail/CVE-2022-21166
93 [ 14 ] CVE-2022-23033
94 https://nvd.nist.gov/vuln/detail/CVE-2022-23033
95 [ 15 ] CVE-2022-23034
96 https://nvd.nist.gov/vuln/detail/CVE-2022-23034
97 [ 16 ] CVE-2022-23035
98 https://nvd.nist.gov/vuln/detail/CVE-2022-23035
99 [ 17 ] CVE-2022-26362
100 https://nvd.nist.gov/vuln/detail/CVE-2022-26362
101 [ 18 ] CVE-2022-26363
102 https://nvd.nist.gov/vuln/detail/CVE-2022-26363
103 [ 19 ] CVE-2022-26364
104 https://nvd.nist.gov/vuln/detail/CVE-2022-26364
105 [ 20 ] XSA-378
106 [ 21 ] XSA-379
107 [ 22 ] XSA-380
108 [ 23 ] XSA-382
109 [ 24 ] XSA-383
110 [ 25 ] XSA-384
111 [ 26 ] XSA-386
112 [ 27 ] XSA-390
113 [ 28 ] XSA-401
114 [ 29 ] XSA-402
115 [ 30 ] XSA-404
116
117 Availability
118 ============
119
120 This GLSA and any updates to it are available for viewing at
121 the Gentoo Security Website:
122
123 https://security.gentoo.org/glsa/202208-23
124
125 Concerns?
126 =========
127
128 Security is a primary focus of Gentoo Linux and ensuring the
129 confidentiality and security of our users' machines is of utmost
130 importance to us. Any security concerns should be addressed to
131 security@g.o or alternatively, you may file a bug at
132 https://bugs.gentoo.org.
133
134 License
135 =======
136
137 Copyright 2022 Gentoo Foundation, Inc; referenced text
138 belongs to its owner(s).
139
140 The contents of this document are licensed under the
141 Creative Commons - Attribution / Share Alike license.
142
143 https://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature