[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2020:2790-1 -- SLES xen

ID: oval:org.secpod.oval:def:89050323Date: (C)2023-10-10   (M)2023-10-10
Class: PATCHFamily: unix




This update for xen fixes the following issues: - CVE-2020-25602: Fixed an issue where there was a crash when handling guest access to MSR_MISC_ENABLE was thrown - CVE-2020-25598: Added a missing unlock in XENMEM_acquire_resource error path - CVE-2020-25604: Fixed a race condition when migrating timers between x86 HVM vCPU-s - CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers - CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid - CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER - CVE-2020-25603: Fixed an issue due to missing barriers when accessing/allocating an event channel - CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains - CVE-2020-25599: Fixed race conditions with evtchn_reset - CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset / evtchn_destroy - Various bug fixes

Platform:
SUSE Linux Enterprise Desktop 15 SP1
SUSE Linux Enterprise Server 15 SP1
Product:
xen
Reference:
SUSE-SU-2020:2790-1
CVE-2020-25595
CVE-2020-25596
CVE-2020-25597
CVE-2020-25598
CVE-2020-25599
CVE-2020-25600
CVE-2020-25601
CVE-2020-25602
CVE-2020-25603
CVE-2020-25604
CVE    10
CVE-2020-25598
CVE-2020-25597
CVE-2020-25596
CVE-2020-25595
...
CPE    2
cpe:/o:suse:suse_linux_enterprise_server:15:sp1
cpe:/a:xen:xen

© SecPod Technologies