[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248585

 
 

909

 
 

195621

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2021:3322-1 -- SLES xen

ID: oval:org.secpod.oval:def:89045726Date: (C)2021-10-25   (M)2024-01-29
Class: PATCHFamily: unix




This update for xen fixes the following issues: - CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling . - CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: Fixed IOMMU page mapping issues on x86 . - CVE-2021-28697: Fixed grant table v2 status pages that may remain accessible after de-allocation . - CVE-2021-28698: Fixed long running loops in grant table handling . - CVE-2021-20255: Fixed eepro100 stack overflow via infinite recursion . - CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure . - CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure . - CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure . - CVE-2021-28692: Fixed inappropriate x86 IOMMU timeout detection / handling . - CVE-2021-0089: Fixed Speculative Code Store Bypass . - CVE-2021-28690: Fixed x86 TSX Async Abort protections not restored after S3 . - Prevent superpage allocation in the LAPIC and ACPI_INFO range .

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
xen
Reference:
SUSE-SU-2021:3322-1
CVE-2021-0089
CVE-2021-20255
CVE-2021-28690
CVE-2021-28692
CVE-2021-28694
CVE-2021-28695
CVE-2021-28696
CVE-2021-28697
CVE-2021-28698
CVE-2021-28701
CVE-2021-3592
CVE-2021-3594
CVE-2021-3595
CVE    13
CVE-2021-28694
CVE-2021-28695
CVE-2021-28696
CVE-2021-0089
...

© SecPod Technologies