{"affected":[{"ecosystem_specific":{"binaries":[{"xen":"4.10.4_16-3.41.1","xen-devel":"4.10.4_16-3.41.1","xen-libs":"4.10.4_16-3.41.1","xen-tools":"4.10.4_16-3.41.1","xen-tools-domU":"4.10.4_16-3.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-ESPOS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.10.4_16-3.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.10.4_16-3.41.1","xen-devel":"4.10.4_16-3.41.1","xen-libs":"4.10.4_16-3.41.1","xen-tools":"4.10.4_16-3.41.1","xen-tools-domU":"4.10.4_16-3.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-LTSS","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.10.4_16-3.41.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.10.4_16-3.41.1","xen-devel":"4.10.4_16-3.41.1","xen-libs":"4.10.4_16-3.41.1","xen-tools":"4.10.4_16-3.41.1","xen-tools-domU":"4.10.4_16-3.41.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.10.4_16-3.41.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes the following issues:\n\t  \n- CVE-2020-25604: Fixed a race condition when migrating timers between x86 \n  HVM vCPU-s (bsc#1176343,XSA-336)\n- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)\n- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)\n- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)\n- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)\n- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)\n- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)\n- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)\n","id":"SUSE-SU-2020:2789-1","modified":"2020-09-29T12:13:18Z","published":"2020-09-29T12:13:18Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20202789-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25604"}],"related":["CVE-2020-25595","CVE-2020-25596","CVE-2020-25597","CVE-2020-25599","CVE-2020-25600","CVE-2020-25601","CVE-2020-25603","CVE-2020-25604"],"summary":"Security update for xen","upstream":["CVE-2020-25595","CVE-2020-25596","CVE-2020-25597","CVE-2020-25599","CVE-2020-25600","CVE-2020-25601","CVE-2020-25603","CVE-2020-25604"]}