[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2018:1181-1 -- SLES xen

ID: oval:org.secpod.oval:def:89043856Date: (C)2021-03-05   (M)2024-04-17
Class: PATCHFamily: unix




This update for xen fixes several issues. These security issues were fixed: - CVE-2018-8897: Prevent mishandling of debug exceptions on x86 - Handle HPET timers in IO-APIC mode correctly to prevent malicious or buggy HVM guests from causing a hypervisor crash or potentially privilege escalation/information leaks - Prevent unbounded loop, induced by qemu allowing an attacker to permanently keep a physical CPU core busy - CVE-2018-10472: x86 HVM guest OS users were able to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot . - CVE-2018-10471: x86 PV guest OS users were able to cause a denial of service via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754 . - CVE-2018-7550: The load_multiboot function allowed local guest OS users to execute arbitrary code on the host via a mh_load_end_addr value greater than mh_bss_end_addr, which triggers an out-of-bounds read or write memory access . These non-security issues were fixed: - bsc#1072834: Prevent unchecked MSR access error - bsc#1035442: Increase the value of LIBXL_DESTROY_TIMEOUT from 10 to 100 seconds, allowing for more domUs to be shutdown in parallel - bsc#1057493: Prevent DomU crash

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
xen
Reference:
SUSE-SU-2018:1181-1
CVE-2018-10471
CVE-2018-10472
CVE-2018-7550
CVE-2018-8897
CVE    4
CVE-2018-10472
CVE-2018-10471
CVE-2018-7550
CVE-2018-8897
...

© SecPod Technologies