[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2018:1216-1 -- SLES xen

ID: oval:org.secpod.oval:def:89043799Date: (C)2021-03-05   (M)2024-04-17
Class: PATCHFamily: unix




This update for xen fixes several issues. These security issues were fixed: - CVE-2018-8897: Prevent mishandling of debug exceptions on x86 - Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy HVM guests from causing a hypervisor crash or potentially privilege escalation/information leaks - Prevent unbounded loop, induced by qemu allowing an attacker to permanently keep a physical CPU core busy - CVE-2018-10472: x86 HVM guest OS users were able to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot . - CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754 . These non-security issues were fixed: - bsc#1086039: Ensure that Dom0 does represent DomU cpu flags correctly - bsc#1027519: Fixed shadow mode guests

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
xen
Reference:
SUSE-SU-2018:1216-1
CVE-2018-10471
CVE-2018-10472
CVE-2018-8897
CVE    3
CVE-2018-10472
CVE-2018-10471
CVE-2018-8897

© SecPod Technologies