[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:14521-1 -- SLES xen

ID: oval:org.secpod.oval:def:89000368Date: (C)2021-02-24   (M)2024-04-17
Class: PATCHFamily: unix




This update for xen fixes the following issues: - CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling aka quot;CrossTalkquot; - CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets . - CVE-2020-15565: Fixed an issue cache write . - CVE-2020-15567: Fixed an issue with non-atomic modification of live EPT PTE - CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers - CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER - CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid - CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains - CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset / evtchn_destroy - CVE-2020-25603: Fixed an issue due to missing barriers when accessing/allocating an event channel - CVE-2020-25604: Fixed a race condition when migrating timers between x86 HVM vCPU-s

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
xen
Reference:
SUSE-SU-2020:14521-1
CVE-2020-0543
CVE-2020-14364
CVE-2020-15565
CVE-2020-15567
CVE-2020-25595
CVE-2020-25596
CVE-2020-25597
CVE-2020-25600
CVE-2020-25601
CVE-2020-25603
CVE-2020-25604
CVE    11
CVE-2020-15567
CVE-2020-15565
CVE-2020-25597
CVE-2020-25596
...

© SecPod Technologies