File _patchinfo of Package patchinfo.15650

<patchinfo incident="15650">
  <issue tracker="bnc" id="1173378">VUL-0: EMBARGOED: xen: XSA-321 v1 - insufficient cache write-back under VT-d</issue>
  <issue tracker="bnc" id="1173376">VUL-0: EMBARGOED: xen: XSA-317 v1 - Incorrect error handling in event channel port allocation</issue>
  <issue tracker="bnc" id="1173377">VUL-0: EMBARGOED: xen: XSA-319 v1 - inverted code paths in x86 dirty VRAM tracking</issue>
  <issue tracker="bnc" id="1173380">VUL-0: EMBARGOED: xen: XSA-328 v1 - non-atomic modification of live EPT PTE</issue>
  <issue tracker="cve" id="2020-15563"/>
  <issue tracker="cve" id="2020-15565"/>
  <issue tracker="cve" id="2020-15566"/>
  <issue tracker="cve" id="2020-15567"/>
  <packager>charlesa</packager>
  <rating>important</rating>
  <category>security</category>
  <summary>Security update for xen</summary>
  <description>This update for xen fixes the following issues:

- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
</description>
</patchinfo>
openSUSE Build Service is sponsored by