[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251951

 
 

909

 
 

196667

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 195929 Download | Alert*

This update for xen fixes the following issues: - bsc#1178963 - stack corruption from XSA-346 change - bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries - bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code - bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes - bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates ...

This update for xen fixes the following issues: - bsc#1178963 - stack corruption from XSA-346 change - bsc#1178935 - CVE-2020-25723: assertion failure through usb_packet_unmap in hw/usb/hcd-ehci.c - bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries - bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code - bsc#1177413 - CVE-2020-27671: undue de ...

This update for xen fixes the following issues: Security issue fixed: - CVE-2020-28368: Fixed the Intel RAPL sidechannel attack, aka PLATYPUS attack, aka XSA-351 . Non-security issues fixed: - Updated to Xen 4.12.4 bug fix release . - Fixed a panic during MSI cleanup on AMD hardware . - Adjusted help for --max_iters, default is 5 . - Improved performance of live migration to get more throughput on ...

This update for xen fixes the following issues: Security issue fixed: - CVE-2020-28368: Fixed the Intel RAPL sidechannel attack, aka PLATYPUS attack, aka XSA-351 . Non-security issue fixed: - Adjusted help for --max_iters, default is 5 .

This update for xen fixes the following issues: - bsc#1178963 - stack corruption from XSA-346 change - bsc#1177409 - CVE-2020-27674: x86 PV guest INVLPG-like flushes may leave stale TLB entries - bsc#1177412 - CVE-2020-27672: Race condition in Xen mapping code - bsc#1177413 - CVE-2020-27671: undue deferral of IOMMU TLB flushes - bsc#1177414 - CVE-2020-27670: unsafe AMD IOMMU page table updates ...

This update for xen fixes the following issues: - bsc#1178963 - VUL-0: xen: stack corruption from XSA-346 change

Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, privilege escalation or information leaks.

It was discovered that the default blacklist of XStream, a Java library to serialise objects to XML and back again, was vulnerable to the execution of arbitrary shell commands by manipulating the processed input stream. For additional defense-in-depth it is recommended to switch to the whitelist approach of XStream"s security framework. For additional information please refer to https://github.com ...

A flaw was found in xstream. An unsafe deserialization of user-supplied XML, in conjunction with relying on the default deny list, allows a remote attacker to perform a variety of attacks including a remote code execution of arbitrary code in the context of the JVM running the XStream application. The highest threat from this vulnerability is to data confidentiality and integrity as well as system ...

XStream is a Java XML serialization library to serialize objects to and deserialize object from XML. Security Fix: * XStream: remote code execution due to insecure XML deserialization when relying on blocklists For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section.


Pages:      Start    9546    9547    9548    9549    9550    9551    9552    9553    9554    9555    9556    9557    9558    9559    ..   19592

© SecPod Technologies