exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

Gentoo Linux Security Advisory 202402-07

Gentoo Linux Security Advisory 202402-07
Posted Feb 5, 2024
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 202402-7 - Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution. Versions greater than or equal to 4.16.6_pre1 are affected.

tags | advisory, arbitrary, vulnerability, code execution
systems | linux, gentoo
advisories | CVE-2021-28703, CVE-2021-28704, CVE-2021-28705, CVE-2021-28706, CVE-2021-28707, CVE-2021-28708, CVE-2021-28709, CVE-2022-23816, CVE-2022-23824, CVE-2022-23825, CVE-2022-26356, CVE-2022-26357, CVE-2022-26358, CVE-2022-26359
SHA-256 | 19872780145bfa0c32c4309b28ecde3c62c36daf70f877bcfa9b07a713bfd2ba

Gentoo Linux Security Advisory 202402-07

Change Mirror Download
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202402-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: High
Title: Xen: Multiple Vulnerabilities
Date: February 04, 2024
Bugs: #754105, #757126, #826998, #837575, #858122, #876790, #879031, #903624, #905389, #915970
ID: 202402-07

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Xen, the worst of which can
lead to arbitrary code execution.

Background
==========

Xen is a bare-metal hypervisor.

Affected packages
=================

Package Vulnerable Unaffected
----------------- ------------- --------------
app-emulation/xen < 4.16.6_pre1 >= 4.16.6_pre1

Description
===========

Multiple vulnerabilities have been discovered in Xen. Please review the
CVE identifiers referenced below for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Xen users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulation/xen-4.16.6_pre1"

References
==========

[ 1 ] CVE-2021-28703
https://nvd.nist.gov/vuln/detail/CVE-2021-28703
[ 2 ] CVE-2021-28704
https://nvd.nist.gov/vuln/detail/CVE-2021-28704
[ 3 ] CVE-2021-28705
https://nvd.nist.gov/vuln/detail/CVE-2021-28705
[ 4 ] CVE-2021-28706
https://nvd.nist.gov/vuln/detail/CVE-2021-28706
[ 5 ] CVE-2021-28707
https://nvd.nist.gov/vuln/detail/CVE-2021-28707
[ 6 ] CVE-2021-28708
https://nvd.nist.gov/vuln/detail/CVE-2021-28708
[ 7 ] CVE-2021-28709
https://nvd.nist.gov/vuln/detail/CVE-2021-28709
[ 8 ] CVE-2022-23816
https://nvd.nist.gov/vuln/detail/CVE-2022-23816
[ 9 ] CVE-2022-23824
https://nvd.nist.gov/vuln/detail/CVE-2022-23824
[ 10 ] CVE-2022-23825
https://nvd.nist.gov/vuln/detail/CVE-2022-23825
[ 11 ] CVE-2022-26356
https://nvd.nist.gov/vuln/detail/CVE-2022-26356
[ 12 ] CVE-2022-26357
https://nvd.nist.gov/vuln/detail/CVE-2022-26357
[ 13 ] CVE-2022-26358
https://nvd.nist.gov/vuln/detail/CVE-2022-26358
[ 14 ] CVE-2022-26359
https://nvd.nist.gov/vuln/detail/CVE-2022-26359
[ 15 ] CVE-2022-26360
https://nvd.nist.gov/vuln/detail/CVE-2022-26360
[ 16 ] CVE-2022-26361
https://nvd.nist.gov/vuln/detail/CVE-2022-26361
[ 17 ] CVE-2022-27672
https://nvd.nist.gov/vuln/detail/CVE-2022-27672
[ 18 ] CVE-2022-29900
https://nvd.nist.gov/vuln/detail/CVE-2022-29900
[ 19 ] CVE-2022-29901
https://nvd.nist.gov/vuln/detail/CVE-2022-29901
[ 20 ] CVE-2022-33746
https://nvd.nist.gov/vuln/detail/CVE-2022-33746
[ 21 ] CVE-2022-33747
https://nvd.nist.gov/vuln/detail/CVE-2022-33747
[ 22 ] CVE-2022-33748
https://nvd.nist.gov/vuln/detail/CVE-2022-33748
[ 23 ] CVE-2022-33749
https://nvd.nist.gov/vuln/detail/CVE-2022-33749
[ 24 ] CVE-2022-42309
https://nvd.nist.gov/vuln/detail/CVE-2022-42309
[ 25 ] CVE-2022-42310
https://nvd.nist.gov/vuln/detail/CVE-2022-42310
[ 26 ] CVE-2022-42319
https://nvd.nist.gov/vuln/detail/CVE-2022-42319
[ 27 ] CVE-2022-42320
https://nvd.nist.gov/vuln/detail/CVE-2022-42320
[ 28 ] CVE-2022-42321
https://nvd.nist.gov/vuln/detail/CVE-2022-42321
[ 29 ] CVE-2022-42322
https://nvd.nist.gov/vuln/detail/CVE-2022-42322
[ 30 ] CVE-2022-42323
https://nvd.nist.gov/vuln/detail/CVE-2022-42323
[ 31 ] CVE-2022-42324
https://nvd.nist.gov/vuln/detail/CVE-2022-42324
[ 32 ] CVE-2022-42325
https://nvd.nist.gov/vuln/detail/CVE-2022-42325
[ 33 ] CVE-2022-42326
https://nvd.nist.gov/vuln/detail/CVE-2022-42326
[ 34 ] CVE-2022-42327
https://nvd.nist.gov/vuln/detail/CVE-2022-42327
[ 35 ] CVE-2022-42330
https://nvd.nist.gov/vuln/detail/CVE-2022-42330
[ 36 ] CVE-2022-42331
https://nvd.nist.gov/vuln/detail/CVE-2022-42331
[ 37 ] CVE-2022-42332
https://nvd.nist.gov/vuln/detail/CVE-2022-42332
[ 38 ] CVE-2022-42333
https://nvd.nist.gov/vuln/detail/CVE-2022-42333
[ 39 ] CVE-2022-42334
https://nvd.nist.gov/vuln/detail/CVE-2022-42334
[ 40 ] CVE-2022-42335
https://nvd.nist.gov/vuln/detail/CVE-2022-42335
[ 41 ] XSA-351
[ 42 ] XSA-355
[ 43 ] XSA-385
[ 44 ] XSA-387
[ 45 ] XSA-388
[ 46 ] XSA-389
[ 47 ] XSA-397
[ 48 ] XSA-399
[ 49 ] XSA-400
[ 50 ] XSA-407
[ 51 ] XSA-412
[ 52 ] XSA-414
[ 53 ] XSA-415
[ 54 ] XSA-416
[ 55 ] XSA-417
[ 56 ] XSA-418
[ 57 ] XSA-419
[ 58 ] XSA-420
[ 59 ] XSA-421
[ 60 ] XSA-422
[ 61 ] XSA-425
[ 62 ] XSA-430

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/202402-07

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5
Login or Register to add favorites

File Archive:

December 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    0 Files
  • 2
    Dec 2nd
    41 Files
  • 3
    Dec 3rd
    0 Files
  • 4
    Dec 4th
    0 Files
  • 5
    Dec 5th
    0 Files
  • 6
    Dec 6th
    0 Files
  • 7
    Dec 7th
    0 Files
  • 8
    Dec 8th
    0 Files
  • 9
    Dec 9th
    0 Files
  • 10
    Dec 10th
    0 Files
  • 11
    Dec 11th
    0 Files
  • 12
    Dec 12th
    0 Files
  • 13
    Dec 13th
    0 Files
  • 14
    Dec 14th
    0 Files
  • 15
    Dec 15th
    0 Files
  • 16
    Dec 16th
    0 Files
  • 17
    Dec 17th
    0 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close