[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:2822-1 -- SLES xen

ID: oval:org.secpod.oval:def:89000559Date: (C)2021-02-23   (M)2024-04-17
Class: PATCHFamily: unix




This update for xen fixes the following issues: - CVE-2020-25604: Fixed a race condition when migrating timers between x86 HVM vCPU-s - CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers - CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid - CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER - CVE-2020-25603: Fixed an issue due to missing barriers when accessing/allocating an event channel - CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains - CVE-2020-25599: Fixed race conditions with evtchn_reset - CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset / evtchn_destroy - CVE-2020-14364: Fixed an out-of-bounds read/write access while processing usb packets . - CVE-2020-0543: Fixed a leak of Special Register Buffer Data Sampling aka quot;CrossTalkquot; - CVE-2020-15565: Fixed an issue cache write . - CVE-2020-15567: Fixed an issue with non-atomic modification of live EPT PTE

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
xen
Reference:
SUSE-SU-2020:2822-1
CVE-2020-0543
CVE-2020-14364
CVE-2020-15565
CVE-2020-15567
CVE-2020-25595
CVE-2020-25596
CVE-2020-25597
CVE-2020-25599
CVE-2020-25600
CVE-2020-25601
CVE-2020-25603
CVE-2020-25604
CVE    12
CVE-2020-15567
CVE-2020-15565
CVE-2020-25597
CVE-2020-25596
...

© SecPod Technologies