Security update for xen
This update for xen fixes the following issues:
- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (bsc#1172205).
Additional upstream bug fixes (bsc#1027519)
This update was imported from the SUSE:SLE-15-SP1:Update update project.
-
Submitted by
Charles Arnold (charlesa)
Fixed bugs
bnc#1173380
VUL-0: EMBARGOED: xen: XSA-328 v1 - non-atomic modification of live EPT PTE
bnc#1172205
VUL-0: CVE-2020-0543: xen: XSA-320 v2 - Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk"
bnc#1173377
VUL-0: EMBARGOED: xen: XSA-319 v1 - inverted code paths in x86 dirty VRAM tracking
bnc#1027519
Xen: Missing upstream bug fixes
bnc#1173376
VUL-0: EMBARGOED: xen: XSA-317 v1 - Incorrect error handling in event channel port allocation
bnc#1173378
VUL-0: EMBARGOED: xen: XSA-321 v1 - insufficient cache write-back under VT-d