[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2019:0020-1 -- SLES xen

ID: oval:org.secpod.oval:def:89003124Date: (C)2021-02-27   (M)2022-10-10
Class: PATCHFamily: unix




This update for xen fixes the following issues: Security vulnerabilities fixed: - CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB flushing with AMD IOMMUs, which potentially allowed a guest to escalate its privileges, may cause a Denial of Service affecting the entire host, or may be able to access data it is not supposed to access. - CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case non-canonical addresses are accessed, which may allow a guest to cause Xen to crash, resulting in a Denial of Service affecting the entire host. - CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which conflicted with shadow paging and allowed a guest to cause Xen to crash, resulting in a Denial of Service . - CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in various Bluetooth functions, allowing this to crash qemu process resulting in Denial of Service . - CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI host bus adapter emulation, which allowed a user and/or process to crash the qemu process resulting in a Denial of Service . Other bugs fixed: - Fixed an issue related to a domU hang on SLE12-SP3 HV - Fixed an issue with xpti=no-dom0 not working as expected - Fixed an issue with live migrations, which used to fail when spectre is enabled on xen boot cmdline - Upstream bug fixes

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
xen
Reference:
SUSE-SU-2019:0020-1
CVE-2018-18849
CVE-2018-19665
CVE-2018-19961
CVE-2018-19962
CVE-2018-19965
CVE-2018-19966
CVE    6
CVE-2018-18849
CVE-2018-19665
CVE-2018-19961
CVE-2018-19966
...
CPE    2
cpe:/o:suse:suse_linux_enterprise_server:12:sp2
cpe:/a:xen:xen

© SecPod Technologies