Automatic update for xen-4.13.1-4.fc33.
* Tue Jul 7 2020 Michael Young <m.a.young@durham.ac.uk> - 4.13.1-4
- incorrect error handling in event channel port allocation leads to
DoS [XSA-317, CVE-2020-15566] (#1854465)
- inverted code paths in x86 dirty VRAM tracking leads to DoS
[XSA-319, CVE-2020-15563] (#1854463)
- xen: insufficient cache write-back under VT-d leads to DoS
[XSA-321, CVE-2020-15565] (#1854467)
- missing alignment check in VCPUOP_register_vcpu_info leads to DoS
[XSA-327, CVE-2020-15564] (#1854458)
- non-atomic modification of live EPT PTE leads to DoS
[XSA-328, CVE-2020-15567] (#1854464)
* Tue Jun 30 2020 Jeff Law <law@redhat.com>
Disable LTO
Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:
sudo dnf upgrade --refresh --advisory=FEDORA-2020-1f9d0ce7b0
Please log in to add feedback.
This update was automatically created
This update's test gating status has been changed to 'waiting'.
This update's test gating status has been changed to 'ignored'.
This update can be pushed to stable now if the maintainer wishes
This update has been submitted for stable by bodhi