Fedora Linux 8568 Published by

A xen security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: xen-4.15.2-3.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-dfbf7e2372
2022-04-21 21:21:21.120204
--------------------------------------------------------------------------------

Name : xen
Product : Fedora 35
Version : 4.15.2
Release : 3.fc35
URL :   http://xen.org/
Summary : Xen is a virtual machine monitor
Description :
This package contains the XenD daemon and xm command line
tools, needed to manage virtual machines running under the
Xen hypervisor

--------------------------------------------------------------------------------
Update Information:

Racy interactions between dirty vram tracking and paging log dirty hypercalls
[XSA-397, CVE-2022-26356] race in VT-d domain ID cleanup [XSA-399,
CVE-2022-26357] IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues
[XSA-400, CVE-2022-26358, CVE-2022-26359, CVE-2022-26360, CVE-2022-26361]
--------------------------------------------------------------------------------
ChangeLog:

* Wed Apr 6 2022 Michael Young - 4.15.2-3
- Racy interactions between dirty vram tracking and paging log dirty
hypercalls [XSA-397, CVE-2022-26356]
- race in VT-d domain ID cleanup [XSA-399, CVE-2022-26357]
- IOMMU: RMRR (VT-d) and unity map (AMD-Vi) handling issues [XSA-400,
CVE-2022-26358, CVE-2022-26359, CVE-2022-26360, CVE-2022-26361]
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-dfbf7e2372' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________