[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255116

 
 

909

 
 

198683

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2021:1023-1 -- SLES xen

ID: oval:org.secpod.oval:def:89044133Date: (C)2021-04-23   (M)2024-04-17
Class: PATCHFamily: unix




This update for xen fixes the following issues: - CVE-2021-3308: VUL-0: xen: IRQ vector leak on x86 - CVE-2021-28687: VUL-0: xen: HVM soft-reset crashes toolstack - CVE-2021-20257: VUL-0: xen: infinite loop issue in the e1000 NIC emulator - CVE-2020-28368: VUL-0: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka - L3: conring size for XEN HV"s with huge memory to small. Inital Xen logs cut - Kdump of HVM fails, soft-reset not handled by libxl - OpenQA job causes libvirtd to dump core when running kdump inside domain - Allow restart of xenwatchdogd, enable tuning of keep-alive interval and timeout options via XENWATCHDOGD_ARGS= - The receiving side did detect holes in a to-be-allocated superpage, but allocated a superpage anyway. This resulted to over-allocation - The receiving side may punch holes incorrectly into optimistically allocated superpages. Also reduce overhead in bitmap handling - Upstream bug fixes

Platform:
SUSE Linux Enterprise Server 12 SP5
Product:
xen
Reference:
SUSE-SU-2021:1023-1
CVE-2020-28368
CVE-2021-20257
CVE-2021-28687
CVE-2021-3308
CVE    4
CVE-2021-28687
CVE-2021-3308
CVE-2020-28368
CVE-2021-20257
...

© SecPod Technologies