[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2017:0571-1 -- SLES xen

ID: oval:org.secpod.oval:def:89044725Date: (C)2021-07-07   (M)2023-12-07
Class: PATCHFamily: unix




This update for xen fixes several issues. These security issues were fixed: - CVE-2017-2620: In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine cirrus_bitblt_cputovideo failed to check the memory region, allowing for an out-of-bounds write that allows for privilege escalation . - CVE-2017-2615: An error in the bitblt copy operation could have allowed a malicious guest administrator to cause an out of bounds memory access, possibly leading to information disclosure or privilege escalation . - A malicious guest could have, by frequently rebooting over extended periods of time, run the host system out of memory, resulting in a Denial of Service - CVE-2016-9921: The Cirrus CLGD 54xx VGA Emulator support was vulnerable to a divide by zero issue while copying VGA data. A privileged user inside guest could have used this flaw to crash the process instance on the host, resulting in DoS

Platform:
SUSE Linux Enterprise Server 12 SP2
Product:
xen
Reference:
SUSE-SU-2017:0571-1
CVE-2016-9921
CVE-2016-9922
CVE-2017-2615
CVE-2017-2620
CVE    4
CVE-2016-9922
CVE-2016-9921
CVE-2017-2620
CVE-2017-2615
...
CPE    2
cpe:/o:suse:suse_linux_enterprise_server:12:sp2
cpe:/a:xen:xen

© SecPod Technologies