[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2018:0472-1 -- SLES xen

ID: oval:org.secpod.oval:def:89043690Date: (C)2021-03-05   (M)2024-04-17
Class: PATCHFamily: unix




This update for xen fixes several issues. These security issues were fixed: - CVE-2017-5753, CVE-2017-5715, CVE-2017-5754: Prevent information leaks via side effects of speculative execution, aka Spectre and Meltdown attacks - CVE-2017-15595: x86 PV guest OS users were able to cause a DoS or possibly gain privileges via crafted page-table stacking - CVE-2017-17566: Prevent PV guest OS users to cause a denial of service or gain host OS privileges in shadow mode by mapping a certain auxiliary page . - CVE-2017-17563: Prevent guest OS users to cause a denial of service or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode . - CVE-2017-17564: Prevent guest OS users to cause a denial of service or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode . - CVE-2017-17565: Prevent PV guest OS users to cause a denial of service if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P . - CVE-2018-5683: The vga_draw_text function allowed local OS guest privileged users to cause a denial of service by leveraging improper memory address validation . - CVE-2017-18030: The cirrus_invalidate_region function allowed local OS guest privileged users to cause a denial of service via vectors related to negative pitch . These non-security issues were fixed: - bsc#1051729: Prevent invalid symlinks after install of SLES 12 SP2 - bsc#1035442: Increased the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds. If many domUs shutdown in parallel the backends couldn"t keep up - bsc#1027519: Added several upstream patches

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
xen
Reference:
SUSE-SU-2018:0472-1
CVE-2017-15595
CVE-2017-17563
CVE-2017-17564
CVE-2017-17565
CVE-2017-17566
CVE-2017-18030
CVE-2017-5715
CVE-2017-5753
CVE-2017-5754
CVE-2018-5683
CVE    10
CVE-2017-15595
CVE-2017-18030
CVE-2017-17563
CVE-2017-17564
...

© SecPod Technologies