File _patchinfo of Package patchinfo.15649

<patchinfo incident="15649">
  <issue tracker="bnc" id="1173380">VUL-0: EMBARGOED: xen: XSA-328 v1 - non-atomic modification of live EPT PTE</issue>
  <issue tracker="bnc" id="1172205">VUL-0: CVE-2020-0543: xen: XSA-320 v2 - Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk"</issue>
  <issue tracker="bnc" id="1173377">VUL-0: EMBARGOED: xen: XSA-319 v1 - inverted code paths in x86 dirty VRAM tracking</issue>
  <issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
  <issue tracker="bnc" id="1173376">VUL-0: EMBARGOED: xen: XSA-317 v1 - Incorrect error handling in event channel port allocation</issue>
  <issue tracker="bnc" id="1173378">VUL-0: EMBARGOED: xen: XSA-321 v1 - insufficient cache write-back under VT-d</issue>
  <issue tracker="cve" id="2020-15563"/>
  <issue tracker="cve" id="2020-15565"/>
  <issue tracker="cve" id="2020-15566"/>
  <issue tracker="cve" id="2020-15567"/>
  <issue tracker="cve" id="2020-0543"/>
  <packager>charlesa</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for xen</summary>
  <description>This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
- CVE-2020-0543: Special Register Buffer Data Sampling (SRBDS) aka "CrossTalk" (bsc#1172205).

Additional upstream bug fixes (bsc#1027519)
</description>
</patchinfo>
openSUSE Build Service is sponsored by