{"affected":[{"ecosystem_specific":{"binaries":[{"xen":"4.13.1_08-lp152.2.9.1","xen-devel":"4.13.1_08-lp152.2.9.1","xen-doc-html":"4.13.1_08-lp152.2.9.1","xen-libs":"4.13.1_08-lp152.2.9.1","xen-libs-32bit":"4.13.1_08-lp152.2.9.1","xen-tools":"4.13.1_08-lp152.2.9.1","xen-tools-domU":"4.13.1_08-lp152.2.9.1","xen-tools-xendomains-wait-disk":"4.13.1_08-lp152.2.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.2","name":"xen","purl":"pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.2"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.13.1_08-lp152.2.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for xen fixes the following issues:\n\n- CVE-2020-25602: Fixed an issue where there was a crash when\n  handling guest access to MSR_MISC_ENABLE was thrown (bsc#1176339,XSA-333)\n- CVE-2020-25598: Added a missing unlock in XENMEM_acquire_resource error path\n  (bsc#1176341,XSA-334)\n- CVE-2020-25604: Fixed a race condition when migrating timers between x86 \n  HVM vCPU-s (bsc#1176343,XSA-336)\n- CVE-2020-25595: Fixed an issue where PCI passthrough code was reading back hardware registers (bsc#1176344,XSA-337)\n- CVE-2020-25597: Fixed an issue where a valid event channels may not turn invalid (bsc#1176346,XSA-338)\n- CVE-2020-25596: Fixed a potential denial of service in x86 pv guest kernel via SYSENTER (bsc#1176345,XSA-339)\n- CVE-2020-25603: Fixed an issue due to  missing barriers when accessing/allocating an event channel (bsc#1176347,XSA-340)\n- CVE-2020-25600: Fixed out of bounds event channels available to 32-bit x86 domains (bsc#1176348,XSA-342)\n- CVE-2020-25599: Fixed race conditions with evtchn_reset() (bsc#1176349,XSA-343)\n- CVE-2020-25601: Fixed an issue due to lack of preemption in evtchn_reset() / evtchn_destroy() (bsc#1176350,XSA-344)\n- Various other fixes (bsc#1027519)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.","id":"openSUSE-SU-2020:1608-1","modified":"2020-10-04T04:23:35Z","published":"2020-10-04T04:23:35Z","references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CHO5L6PB6IYMBMXLFOWKZSK5RTFI66UU/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1027519"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176339"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176341"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176343"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176344"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176345"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176347"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176348"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176349"},{"type":"REPORT","url":"https://bugzilla.suse.com/1176350"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25596"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25600"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-25604"}],"related":["CVE-2020-25595","CVE-2020-25596","CVE-2020-25597","CVE-2020-25598","CVE-2020-25599","CVE-2020-25600","CVE-2020-25601","CVE-2020-25602","CVE-2020-25603","CVE-2020-25604"],"summary":"Security update for xen","upstream":["CVE-2020-25595","CVE-2020-25596","CVE-2020-25597","CVE-2020-25598","CVE-2020-25599","CVE-2020-25600","CVE-2020-25601","CVE-2020-25602","CVE-2020-25603","CVE-2020-25604"]}