SUSE-SU-2020:2790-1 -- SLES xenID: oval:org.secpod.oval:def:89050323 | Date: (C)2023-10-10 (M)2023-10-10 |
Class: PATCH | Family: unix |
This update for xen fixes the following issues: - CVE-2020-25602: Fixed an issue where there was a crash when handling guest access to MSR_MISC_ENABLE was thrown - CVE-2020-25598: Added a missing unlock in XENMEM_acquire_resource error path - CVE-2020-25604: Fixed a race condition when migrating timers between x86 HVM vCPU-s - CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers - CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid - CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER - CVE-2020-25603: Fixed an issue due to missing barriers when accessing/allocating an event channel - CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains - CVE-2020-25599: Fixed race conditions with evtchn_reset - CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset / evtchn_destroy - Various bug fixes
Platform: |
SUSE Linux Enterprise Desktop 15 SP1 |
SUSE Linux Enterprise Server 15 SP1 |