Fedora 35: xen 2022-2c9f8224f8
Summary
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor
Linux disk/nic frontends data leaks [XSA-403, CVE-2022-26365, CVE-2022-33740,
CVE-2022-33741, CVE-2022-33742] (#2104747) ---- update to xen-4.15.3 x86: MMIO
Stale Data vulnerabilities (not applied in 4.15.2-5) ---- x86: MMIO Stale Data
vulnerabilities [XSA-404, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166] ----x86 pv: Race condition in typeref acquisition [XSA-401, CVE-2022-26362] x86 pv:
Insufficient care with non-coherent mappings [ XSA-402, CVE-2022-26363,
CVE-2022-26364]
* Thu Jul 7 2022 Michael Young
- Linux disk/nic frontends data leaks [XSA-403, CVE-2022-26365,
CVE-2022-33740, CVE-2022-33741, CVE-2022-33742] (#2104747)
* Fri Jul 1 2022 Michael Young
- update to xen-4.15.3
remove or adjust patches now included or superceded upstream
- x86: MMIO Stale Data vulnerabilities (not applied in 4.15.2-5)
* Wed Jun 22 2022 Michael Young
- x86: MMIO Stale Data vulnerabilities [XSA-404, CVE-2022-21123,
CVE-2022-21125, CVE-2022-21166]
* Thu Jun 9 2022 Michael Young
- x86 pv: Race condition in typeref acquisition [XSA-401, CVE-2022-26362]
- x86 pv: Insufficient care with non-coherent mappings [ XSA-402,
CVE-2022-26363, CVE-2022-26364]
- additional patches so above applies cleanly
[ 1 ] Bug #2104746 - CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 xen: Linux disk/nic frontends data leaks
https://bugzilla.redhat.com/show_bug.cgi?id=2104746
su -c 'dnf upgrade --advisory FEDORA-2022-2c9f8224f8' at the command
line. For more information, refer to the dnf documentation available at
https://dnf.readthedocs.io/en/latest/command_ref.html
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/security/
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
FEDORA-2022-2c9f8224f8 2022-07-23 02:26:57.539844 Product : Fedora 35 Version : 4.15.3 Release : 2.fc35 URL : https://xenproject.org/ Summary : Xen is a virtual machine monitor Description : This package contains the XenD daemon and xm command line tools, needed to manage virtual machines running under the Xen hypervisor Linux disk/nic frontends data leaks [XSA-403, CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742] (#2104747) ---- update to xen-4.15.3 x86: MMIO Stale Data vulnerabilities (not applied in 4.15.2-5) ---- x86: MMIO Stale Data vulnerabilities [XSA-404, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166] ----x86 pv: Race condition in typeref acquisition [XSA-401, CVE-2022-26362] x86 pv: Insufficient care with non-coherent mappings [ XSA-402, CVE-2022-26363, CVE-2022-26364] * Thu Jul 7 2022 Michael Young - 4.15.3-2 - Linux disk/nic frontends data leaks [XSA-403, CVE-2022-26365, CVE-2022-33740, CVE-2022-33741, CVE-2022-33742] (#2104747) * Fri Jul 1 2022 Michael Young - 4.15.3-1 - update to xen-4.15.3 remove or adjust patches now included or superceded upstream - x86: MMIO Stale Data vulnerabilities (not applied in 4.15.2-5) * Wed Jun 22 2022 Michael Young - 4.15.2-5 - x86: MMIO Stale Data vulnerabilities [XSA-404, CVE-2022-21123, CVE-2022-21125, CVE-2022-21166] * Thu Jun 9 2022 Michael Young - 4.15.2-4 - x86 pv: Race condition in typeref acquisition [XSA-401, CVE-2022-26362] - x86 pv: Insufficient care with non-coherent mappings [ XSA-402, CVE-2022-26363, CVE-2022-26364] - additional patches so above applies cleanly [ 1 ] Bug #2104746 - CVE-2022-26365 CVE-2022-33740 CVE-2022-33741 CVE-2022-33742 xen: Linux disk/nic frontends data leaks https://bugzilla.redhat.com/show_bug.cgi?id=2104746 su -c 'dnf upgrade --advisory FEDORA-2022-2c9f8224f8' at the command line. For more information, refer to the dnf documentation available at https://dnf.readthedocs.io/en/latest/command_ref.html All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/security/ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure
Change Log
References