{"affected":[{"ecosystem_specific":{"binaries":[{"xen-devel":"4.12.2_04-3.11.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.2_04-3.11.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.12.2_04-3.11.1","xen-doc-html":"4.12.2_04-3.11.1","xen-libs":"4.12.2_04-3.11.1","xen-libs-32bit":"4.12.2_04-3.11.1","xen-tools":"4.12.2_04-3.11.1","xen-tools-domU":"4.12.2_04-3.11.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.2_04-3.11.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.12.2_04-3.11.1","xen-doc-html":"4.12.2_04-3.11.1","xen-libs":"4.12.2_04-3.11.1","xen-libs-32bit":"4.12.2_04-3.11.1","xen-tools":"4.12.2_04-3.11.1","xen-tools-domU":"4.12.2_04-3.11.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.2_04-3.11.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen to version 4.12.2 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2020-11742: Bad continuation handling in GNTTABOP_copy (bsc#1169392).\n- CVE-2020-11740, CVE-2020-11741: xen: XSA-313 multiple xenoprof issues (bsc#1168140).\n- CVE-2020-11739: Missing memory barriers in read-write unlock paths (bsc#1168142).\n- CVE-2020-11743: Bad error path in GNTTABOP_map_grant (bsc#1168143).\n- CVE-2020-7211: Fixed potential directory traversal using relative paths via \n  tftp server on Windows host (bsc#1161181).\n- arm: a CPU may speculate past the ERET instruction (bsc#1160932).\n\nNon-security issues fixed:\n\n- Xenstored Crashed during VM install (bsc#1167152)\n- DomU hang: soft lockup CPU #0 stuck under high load (bsc#1165206, bsc#1134506)\n- Update API compatibility versions, fixes issues for libvirt. (bsc#1167007, bsc#1157490)\n- aacraid blocks xen commands (bsc#1155200)\n- Problems Booting Fedora31 VM on sles15 sp1 Xen Dom0 (bsc#1162040).\n","id":"SUSE-SU-2020:1139-1","modified":"2020-04-29T10:53:27Z","published":"2020-04-29T10:53:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20201139-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1134506"},{"type":"REPORT","url":"https://bugzilla.suse.com/1155200"},{"type":"REPORT","url":"https://bugzilla.suse.com/1157490"},{"type":"REPORT","url":"https://bugzilla.suse.com/1160932"},{"type":"REPORT","url":"https://bugzilla.suse.com/1161181"},{"type":"REPORT","url":"https://bugzilla.suse.com/1162040"},{"type":"REPORT","url":"https://bugzilla.suse.com/1165206"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167007"},{"type":"REPORT","url":"https://bugzilla.suse.com/1167152"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168140"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168142"},{"type":"REPORT","url":"https://bugzilla.suse.com/1168143"},{"type":"REPORT","url":"https://bugzilla.suse.com/1169392"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11740"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11741"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-11743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-7211"}],"related":["CVE-2020-11739","CVE-2020-11740","CVE-2020-11741","CVE-2020-11742","CVE-2020-11743","CVE-2020-7211"],"summary":"Security update for xen","upstream":["CVE-2020-11739","CVE-2020-11740","CVE-2020-11741","CVE-2020-11742","CVE-2020-11743","CVE-2020-7211"]}