File _patchinfo of Package patchinfo.20930

<patchinfo incident="20930">                                                                                                                                                                   
  <issue tracker="bnc" id="1189376">VUL-0: EMBARGOED: CVE-2021-28697: xen: grant table v2 status pages may remain accessible after de-allocation. (XSA-379)</issue>                            
  <issue tracker="bnc" id="1181254">VUL-0: CVE-2021-3308: xen: IRQ vector leak on x86 (XSA-360)</issue>                                                                                        
  <issue tracker="bnc" id="1189373">VUL-0: EMBARGOED: CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: xen: IOMMU page mapping issues on x86 (XSA-378)</issue>
  <issue tracker="bnc" id="1186434">VUL-0: CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (XSA-377)</issue>
  <issue tracker="bnc" id="1182654">VUL-1: CVE-2021-20255: xen: eepro100: stack overflow via infinite recursion</issue>
  <issue tracker="bnc" id="1186433">VUL-0: CVE-2021-0089,CVE-2021-26313: xen: Speculative Code Store Bypass (XSA-375)</issue>
  <issue tracker="bnc" id="1186429">VUL-0: CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (XSA-373)</issue>
  <issue tracker="bnc" id="1189380">VUL-0: EMBARGOED: CVE-2021-28699: xen: inadequate grant-v2 status frames array bounds check. (XSA-382)</issue>
  <issue tracker="bnc" id="1187378">VUL-1: CVE-2021-3594: xen: slirp: invalid pointer initialization may lead to information disclosure (udp)</issue>                                          
  <issue tracker="bnc" id="1189378">VUL-0: EMBARGOED: CVE-2021-28698: xen: long running loops in grant table handling. (XSA-380)</issue>
  <issue tracker="bnc" id="1187376">VUL-1: CVE-2021-3595: xen: slirp: invalid pointer initialization may lead to information disclosure (tftp)</issue>
  <issue tracker="bnc" id="1187369">VUL-1: CVE-2021-3592: xen: slirp: invalid pointer initialization may lead to information disclosure (bootp)</issue>
  <issue tracker="bnc" id="1189882">Prevent superpage allocation in the LAPIC and ACPI_INFO range</issue>
  <issue tracker="cve" id="2021-28698"/>                                                       
  <issue tracker="cve" id="2021-3592"/>                                                        
  <issue tracker="cve" id="2021-28697"/>                                                       
  <issue tracker="cve" id="2021-3595"/>                                                                                                                                                        
  <issue tracker="cve" id="2021-28696"/>                                                                                                                                                       
  <issue tracker="cve" id="2021-28699"/>                                                       
  <issue tracker="cve" id="2021-28692"/>                                                                                                                                                       
  <issue tracker="cve" id="2021-28694"/>                                                       
  <issue tracker="cve" id="2021-20255"/>                                                       
  <issue tracker="cve" id="2021-28690"/>                                                       
  <issue tracker="cve" id="2021-0089"/>                                                                                                                                                        
  <issue tracker="cve" id="2021-3594"/>
  <issue tracker="cve" id="2021-28695"/>
  <issue tracker="cve" id="2021-3308"/>
  <packager>charlesa</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for xen</summary>
  <description>This update for xen fixes the following issues:

Security issues fixed:

- CVE-2021-28698: long running loops in grant table handling (XSA-380)(bsc#1189378).
- CVE-2021-28697: grant table v2 status pages may remain accessible after de-allocation (XSA-379)(bsc#1189376).
- CVE-2021-28694,CVE-2021-28695,CVE-2021-28696: IOMMU page mapping issues on x86 (XSA-378)(bsc#1189373).
- CVE-2021-28699: inadequate grant-v2 status frames array bounds check (XSA-382)(bsc#1189380).
- CVE-2021-28692: xen: inappropriate x86 IOMMU timeout detection / handling (bsc#1186429)
- CVE-2021-28690: xen: x86: TSX Async Abort protections not restored after S3 (bsc#1186434)
- CVE-2021-0089: xen: Speculative Code Store Bypass (bsc#1186433)
- CVE-2021-20255: Fixed stack overflow via infinite recursion in eepro100 (bsc#1182654)
- CVE-2021-3592: slirp: invalid pointer initialization may lead to information disclosure (bootp)(bsc#1187369).
- CVE-2021-3594: slirp: invalid pointer initialization may lead to information disclosure (udp)(bsc#1187378).
- CVE-2021-3595: slirp: invalid pointer initialization may lead to information disclosure (tftp)(bsc#1187376).
- CVE-2021-3308: Fixed IRQ vector leak on x86 (XSA-360)(bsc#1181254).

- Prevent superpage allocation in the LAPIC and ACPI_INFO range (bsc#1189882).
</description>
</patchinfo>
openSUSE Build Service is sponsored by