[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2019:2962-1 -- SLES xen

ID: oval:org.secpod.oval:def:89003283Date: (C)2021-02-27   (M)2024-04-17
Class: PATCHFamily: unix




This update for xen fixes the following issues: - CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a race condition in the Instruction Fetch Unit of the Intel CPU to cause a Machine Exception during Page Size Change, causing the CPU core to be non-functional. - CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs with Transactional Memory support could be used to facilitate sidechannel information leaks out of microarchitectural buffers, similar to the previously described quot;Microarchitectural Data Samplingquot; attack. - CVE-2019-18424: An untrusted domain with access to a physical device can DMA into host memory, leading to privilege escalation. - CVE-2019-18421: A malicious PV guest administrator may have been able to escalate their privilege to that of the host. - CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges to that of the guest kernel. - CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor crash, resulting in a Denial of Service

Platform:
SUSE Linux Enterprise Server 12 SP4
Product:
xen
Reference:
SUSE-SU-2019:2962-1
CVE-2018-12207
CVE-2019-11135
CVE-2019-18420
CVE-2019-18421
CVE-2019-18424
CVE-2019-18425
CVE    6
CVE-2019-18425
CVE-2019-18421
CVE-2019-18424
CVE-2019-18420
...
CPE    2
cpe:/o:suse:suse_linux_enterprise_server:12:sp4
cpe:/a:xen:xen

© SecPod Technologies