rpm package
opensuse/xen&distro=openSUSE Leap 15.3
pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.3
Vulnerabilities (65)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2021-28693 | — | < 4.14.2_04-3.9.1 | 4.14.2_04-3.9.1 | Jun 30, 2021 | xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page | ||
| CVE-2021-28692 | — | < 4.14.2_04-3.9.1 | 4.14.2_04-3.9.1 | Jun 30, 2021 | inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead, | ||
| CVE-2021-28690 | — | < 4.14.2_04-3.9.1 | 4.14.2_04-3.9.1 | Jun 29, 2021 | x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires s | ||
| CVE-2021-28689 | — | < 4.14.5_06-150300.3.35.1 | 4.14.5_06-150300.3.35.1 | Jun 11, 2021 | x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's nov | ||
| CVE-2021-0089 | — | < 4.14.2_04-3.9.1 | 4.14.2_04-3.9.1 | Jun 9, 2021 | Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access. |
- CVE-2021-28693Jun 30, 2021affected < 4.14.2_04-3.9.1fixed 4.14.2_04-3.9.1
xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page
- CVE-2021-28692Jun 30, 2021affected < 4.14.2_04-3.9.1fixed 4.14.2_04-3.9.1
inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead,
- CVE-2021-28690Jun 29, 2021affected < 4.14.2_04-3.9.1fixed 4.14.2_04-3.9.1
x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires s
- CVE-2021-28689Jun 11, 2021affected < 4.14.5_06-150300.3.35.1fixed 4.14.5_06-150300.3.35.1
x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's nov
- CVE-2021-0089Jun 9, 2021affected < 4.14.2_04-3.9.1fixed 4.14.2_04-3.9.1
Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
Page 4 of 4