SUSE-SU-2021:1023-1 -- SLES xenID: oval:org.secpod.oval:def:89044133 | Date: (C)2021-04-23 (M)2024-04-17 |
Class: PATCH | Family: unix |
This update for xen fixes the following issues: - CVE-2021-3308: VUL-0: xen: IRQ vector leak on x86 - CVE-2021-28687: VUL-0: xen: HVM soft-reset crashes toolstack - CVE-2021-20257: VUL-0: xen: infinite loop issue in the e1000 NIC emulator - CVE-2020-28368: VUL-0: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka - L3: conring size for XEN HV"s with huge memory to small. Inital Xen logs cut - Kdump of HVM fails, soft-reset not handled by libxl - OpenQA job causes libvirtd to dump core when running kdump inside domain - Allow restart of xenwatchdogd, enable tuning of keep-alive interval and timeout options via XENWATCHDOGD_ARGS= - The receiving side did detect holes in a to-be-allocated superpage, but allocated a superpage anyway. This resulted to over-allocation - The receiving side may punch holes incorrectly into optimistically allocated superpages. Also reduce overhead in bitmap handling - Upstream bug fixes
Platform: |
SUSE Linux Enterprise Server 12 SP5 |