{"affected":[{"ecosystem_specific":{"binaries":[{"xen-devel":"4.12.4_09-3.39.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.4_09-3.39.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.12.4_09-3.39.3","xen-doc-html":"4.12.4_09-3.39.3","xen-libs":"4.12.4_09-3.39.3","xen-libs-32bit":"4.12.4_09-3.39.3","xen-tools":"4.12.4_09-3.39.3","xen-tools-domU":"4.12.4_09-3.39.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.4_09-3.39.3"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.12.4_09-3.39.3","xen-doc-html":"4.12.4_09-3.39.3","xen-libs":"4.12.4_09-3.39.3","xen-libs-32bit":"4.12.4_09-3.39.3","xen-tools":"4.12.4_09-3.39.3","xen-tools-domU":"4.12.4_09-3.39.3"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.4_09-3.39.3"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes the following issues:\n\n- CVE-2021-3308: VUL-0: xen: IRQ vector leak on x86 (bsc#1181254, XSA-360)\n- CVE-2021-28687: VUL-0: xen: HVM soft-reset crashes toolstack (bsc#1183072, XSA-368)\n- CVE-2021-20257: VUL-0: xen: infinite loop issue in the e1000 NIC emulator (bsc#1182846)\n- CVE-2020-28368: VUL-0: xen: Intel RAPL sidechannel attack aka PLATYPUS attack aka (bsc#1178591, XSA-351)\n- L3: conring size for XEN HV's with huge memory to small. Inital Xen logs cut (bsc#1177204)\n- Kdump of HVM fails, soft-reset not handled by libxl (bsc#1179148)\n- OpenQA job causes libvirtd to dump core when running kdump inside domain (bsc#1181989)\n- Allow restart of xenwatchdogd, enable tuning of keep-alive interval and timeout\n  options via XENWATCHDOGD_ARGS= (bsc#1178736)\n- The receiving side did detect holes in a to-be-allocated superpage, but allocated a superpage anyway.\n  This resulted to over-allocation (bsc#1177112)\n- The receiving side may punch holes incorrectly into optimistically allocated superpages.\n  Also reduce overhead in bitmap handling (bsc#1177112)\n- Upstream bug fixes (bsc#1027519)\n","id":"SUSE-SU-2021:1023-1","modified":"2021-04-06T15:52:02Z","published":"2021-04-06T15:52:02Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20211023-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1177112"},{"type":"REPORT","url":"https://bugzilla.suse.com/1177204"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178591"},{"type":"REPORT","url":"https://bugzilla.suse.com/1178736"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179148"},{"type":"REPORT","url":"https://bugzilla.suse.com/1181254"},{"type":"REPORT","url":"https://bugzilla.suse.com/1181989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1182846"},{"type":"REPORT","url":"https://bugzilla.suse.com/1183072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-28368"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-20257"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-28687"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-3308"}],"related":["CVE-2020-28368","CVE-2021-20257","CVE-2021-28687","CVE-2021-3308"],"summary":"Security update for xen","upstream":["CVE-2020-28368","CVE-2021-20257","CVE-2021-28687","CVE-2021-3308"]}