VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Module for Server Applications 15 SP3

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP3

Vulnerabilities (65)

  • CVE-2021-28693Jun 30, 2021
    affected < 4.14.2_04-3.9.1fixed 4.14.2_04-3.9.1

    xen/arm: Boot modules are not scrubbed The bootloader will load boot modules (e.g. kernel, initramfs...) in a temporary area before they are copied by Xen to each domain memory. To ensure sensitive data is not leaked from the modules, Xen must "scrub" them before handing the page

  • CVE-2021-28692Jun 30, 2021
    affected < 4.14.2_04-3.9.1fixed 4.14.2_04-3.9.1

    inappropriate x86 IOMMU timeout detection / handling IOMMUs process commands issued to them in parallel with the operation of the CPU(s) issuing such commands. In the current implementation in Xen, asynchronous notification of the completion of such commands is not used. Instead,

  • CVE-2021-28690Jun 29, 2021
    affected < 4.14.2_04-3.9.1fixed 4.14.2_04-3.9.1

    x86: TSX Async Abort protections not restored after S3 This issue relates to the TSX Async Abort speculative security vulnerability. Please see https://xenbits.xen.org/xsa/advisory-305.html for details. Mitigating TAA by disabling TSX (the default and preferred option) requires s

  • CVE-2021-28689Jun 11, 2021
    affected < 4.14.5_06-150300.3.35.1fixed 4.14.5_06-150300.3.35.1

    x86: Speculative vulnerabilities with bare (non-shim) 32-bit PV guests 32-bit x86 PV guest kernels run in ring 1. At the time when Xen was developed, this area of the i386 architecture was rarely used, which is why Xen was able to use it to implement paravirtualisation, Xen's nov

  • CVE-2021-0089Jun 9, 2021
    affected < 4.14.2_04-3.9.1fixed 4.14.2_04-3.9.1

    Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

Page 4 of 4