File _patchinfo of Package patchinfo.21123
<patchinfo incident="21123">
<issue tracker="bnc" id="1182654">VUL-1: CVE-2021-20255: xen: eepro100: stack overflow via infinite recursion</issue>
<issue tracker="bnc" id="1189632">VUL-0: CVE-2021-28701: xen: Another race in XENMAPSPACE_grant_table handling (XSA-384)</issue>
<issue tracker="bnc" id="1186429">VUL-0: CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (XSA-373)</issue>
<issue tracker="bnc" id="1189373">VUL-0: CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: xen: IOMMU page mapping issues on x86 (XSA-378)</issue>
<issue tracker="bnc" id="1189882">virsh restore fails to restore full virutalized machine - libxenlight failed to restore domain</issue>
<issue tracker="bnc" id="1189378">VUL-0: CVE-2021-28698: xen: long running loops in grant table handling. (XSA-380)</issue>
<issue tracker="bnc" id="1186433">VUL-0: CVE-2021-0089,CVE-2021-26313: xen: Speculative Code Store Bypass (XSA-375)</issue>
<issue tracker="bnc" id="1186434">VUL-0: CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (XSA-377)</issue>
<issue tracker="bnc" id="1187369">VUL-1: CVE-2021-3592: xen: slirp: invalid pointer initialization may lead to information disclosure (bootp)</issue>
<issue tracker="bnc" id="1187378">VUL-1: CVE-2021-3594: xen: slirp: invalid pointer initialization may lead to information disclosure (udp)</issue>
<issue tracker="bnc" id="1189376">VUL-0: CVE-2021-28697: xen: grant table v2 status pages may remain accessible after de-allocation. (XSA-379)</issue>
<issue tracker="bnc" id="1187376">VUL-1: CVE-2021-3595: xen: slirp: invalid pointer initialization may lead to information disclosure (tftp)</issue>
<issue tracker="cve" id="2021-20255"/>
<issue tracker="cve" id="2021-28701"/>
<issue tracker="cve" id="2021-3592"/>
<issue tracker="cve" id="2021-28697"/>
<issue tracker="cve" id="2021-28698"/>
<issue tracker="cve" id="2021-28692"/>
<issue tracker="cve" id="2021-0089"/>
<issue tracker="cve" id="2021-28690"/>
<issue tracker="cve" id="2021-28696"/>
<issue tracker="cve" id="2021-3595"/>
<issue tracker="cve" id="2021-28695"/>
<issue tracker="cve" id="2021-3594"/>
<issue tracker="cve" id="2021-28694"/>
<packager>charlesa</packager>
<rating>moderate</rating>
<category>security</category>
<summary>Security update for xen</summary>
<description>This update for xen fixes the following issues:
- CVE-2021-28701: Fixed race condition in XENMAPSPACE_grant_table handling (XSA-384) (bsc#1189632).
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: Fixed IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-28697: Fixed grant table v2 status pages that may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-28698: Fixed long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-20255: Fixed eepro100 stack overflow via infinite recursion (bsc#1182654).
- CVE-2021-3592: Fixed invalid pointer initialization may lead to information disclosure (bootp) (bsc#1187369).
- CVE-2021-3594: Fixed invalid pointer initialization may lead to information disclosure (udp) (bsc#1187378).
- CVE-2021-3595: Fixed invalid pointer initialization may lead to information disclosure (tftp) (bsc#1187376).
- CVE-2021-28692: Fixed inappropriate x86 IOMMU timeout detection / handling (XSA-373)(bsc#1186429).
- CVE-2021-0089: Fixed Speculative Code Store Bypass (XSA-375)(bsc#1186433).
- CVE-2021-28690: Fixed x86 TSX Async Abort protections not restored after S3 (XSA-377)(bsc#1186434).
- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
</description>
</patchinfo>