File _patchinfo of Package patchinfo.15650
<patchinfo incident="15650">
<issue tracker="bnc" id="1173378">VUL-0: EMBARGOED: xen: XSA-321 v1 - insufficient cache write-back under VT-d</issue>
<issue tracker="bnc" id="1173376">VUL-0: EMBARGOED: xen: XSA-317 v1 - Incorrect error handling in event channel port allocation</issue>
<issue tracker="bnc" id="1173377">VUL-0: EMBARGOED: xen: XSA-319 v1 - inverted code paths in x86 dirty VRAM tracking</issue>
<issue tracker="bnc" id="1173380">VUL-0: EMBARGOED: xen: XSA-328 v1 - non-atomic modification of live EPT PTE</issue>
<issue tracker="cve" id="2020-15563"/>
<issue tracker="cve" id="2020-15565"/>
<issue tracker="cve" id="2020-15566"/>
<issue tracker="cve" id="2020-15567"/>
<packager>charlesa</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for xen</summary>
<description>This update for xen fixes the following issues:
- CVE-2020-15563: Fixed inverted code paths in x86 dirty VRAM tracking (bsc#1173377).
- CVE-2020-15565: Fixed insufficient cache write-back under VT-d (bsc#1173378).
- CVE-2020-15566: Fixed incorrect error handling in event channel port allocation (bsc#1173376).
- CVE-2020-15567: Fixed non-atomic modification of live EPT PTE (bsc#1173380).
</description>
</patchinfo>