{"affected":[{"ecosystem_specific":{"binaries":[{"xen-libs":"4.12.3_08-3.28.1","xen-tools-domU":"4.12.3_08-3.28.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Basesystem 15 SP1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.3_08-3.28.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"xen":"4.12.3_08-3.28.1","xen-devel":"4.12.3_08-3.28.1","xen-tools":"4.12.3_08-3.28.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP1","name":"xen","purl":"pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.3_08-3.28.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes the following issues:\n\n- CVE-2020-25602: Fixed an issue where there was a crash when\n  handling guest access to MSR_MISC_ENABLE was thrown (bsc#1176339,XSA-333)\n- CVE-2020-25598: Added a missing unlock in XENMEM_acquire_resource error path\n  (bsc#1176341,XSA-334)\n- CVE-2020-25604: Fixed a race condition when migrating timers between x86 \n  HVM vCPU-s (bsc#1176343,XSA-336)\n- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)\n- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)\n- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)\n- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)\n- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)\n- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)\n- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)\t  \n\n- Various bug fixes (bsc#1027519)\n","id":"SUSE-SU-2020:2790-1","modified":"2020-09-29T12:13:34Z","published":"2020-09-29T12:13:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2020/suse-su-20202790-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176341"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25604"}],"related":["CVE-2020-25595","CVE-2020-25596","CVE-2020-25597","CVE-2020-25598","CVE-2020-25599","CVE-2020-25600","CVE-2020-25601","CVE-2020-25602","CVE-2020-25603","CVE-2020-25604"],"summary":"Security update for xen","upstream":["CVE-2020-25595","CVE-2020-25596","CVE-2020-25597","CVE-2020-25598","CVE-2020-25599","CVE-2020-25600","CVE-2020-25601","CVE-2020-25602","CVE-2020-25603","CVE-2020-25604"]}