Oval Definition:oval:org.opensuse.security:def:66147
Revision Date:2020-12-01Version:1
Title:Security update for xen (Important)
Description:

This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377). - CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378). - CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376). - CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380). - CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka 'CrossTalk' (bsc#1172205).

Additional upstream bug fixes (bsc#1027519)
Family:unixClass:patch
Status:Reference(s):1027519
1167240
1172205
1173376
1173377
1173378
1173380
CVE-2020-0543
CVE-2020-15563
CVE-2020-15565
CVE-2020-15566
CVE-2020-15567
CVE-2020-5267
SUSE-SU-2020:1178-1
SUSE-SU-2020:1889-1
Platform(s):SUSE Linux Enterprise High Availability 15 SP1
SUSE Linux Enterprise Module for Server Applications 15 SP1
Product(s):
Definition Synopsis
  • SUSE Linux Enterprise High Availability 15 SP1 is installed
  • AND Package Information
  • ruby2.5-rubygem-actionview-5_1-5.1.4-3.3 is installed
  • OR rubygem-actionview-5_1-5.1.4-3.3 is installed
  • Definition Synopsis
  • SUSE Linux Enterprise Module for Server Applications 15 SP1 is installed
  • AND Package Information
  • xen-4.12.3_04-3.22 is installed
  • OR xen-devel-4.12.3_04-3.22 is installed
  • OR xen-tools-4.12.3_04-3.22 is installed
  • BACK