[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2017:1081-1 -- SLES xen

ID: oval:org.secpod.oval:def:89044673Date: (C)2021-07-07   (M)2024-01-29
Class: PATCHFamily: unix




This update for xen fixes the following issues: These security issues were fixed: - CVE-2017-7228: Broken check in memory_exchange permited PV guest breakout . - XSA-206: Unprivileged guests issuing writes to xenstore were able to stall progress of the control domain or driver domain, possibly leading to a Denial of Service of the entire host . - CVE-2016-9603: A privileged user within the guest VM can cause a heap overflow in the device model process, potentially escalating their privileges to that of the device model process . - CVE-2017-6414: Memory leak in the vcard_apdu_new function in card_7816.c in libcacard allowed local guest OS users to cause a denial of service via vectors related to allocating a new APDU object . - CVE-2017-6505: The ohci_service_ed_list function in hw/usb/hcd-ohci.c allowed local guest OS users to cause a denial of service via vectors involving the number of link endpoint list descriptors . - CVE-2017-2633: The VNC display driver support was vulnerable to an out-of-bounds memory access issue. A user/process inside guest could use this flaw to cause DoS . These non-security issues were fixed: - bsc#1022555: Timeout in execution of /etc/xen/scripts/block add - bsc#1029827: Forward port xenstored

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
xen
Reference:
SUSE-SU-2017:1081-1
CVE-2016-9603
CVE-2017-2633
CVE-2017-6414
CVE-2017-6505
CVE-2017-7228
CVE    5
CVE-2017-6414
CVE-2017-6505
CVE-2017-7228
CVE-2016-9603
...
CPE    2
cpe:/a:xen:xen
cpe:/o:suse:suse_linux_enterprise_server:11:sp4

© SecPod Technologies