[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250038

 
 

909

 
 

195843

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2017:1145-1 -- SLES xen

ID: oval:org.secpod.oval:def:89044790Date: (C)2021-07-20   (M)2022-10-10
Class: PATCHFamily: unix




This update for xen fixes several issues. These security issues were fixed: - A malicious 64-bit PV guest may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks by placing a IRET hypercall in the middle of a multicall batch - A malicious pair of guests may be able to access all of system memory, allowing for all of privilege escalation, host crashes, and information leaks because of a missing check when transfering pages via GNTTABOP_transfer . - CVE-2017-7718: hw/display/cirrus_vga_rop.h allowed local guest OS privileged users to cause a denial of service via vectors related to copying VGA data via the cirrus_bitblt_rop_fwd_transp_ and cirrus_bitblt_rop_fwd_ functions . - CVE-2016-9603: A privileged user within the guest VM could have caused a heap overflow in the device model process, potentially escalating their privileges to that of the device model process These non-security issues were fixed: - bsc#1029827: Additional xenstore patch

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
xen
Reference:
SUSE-SU-2017:1145-1
CVE-2016-9603
CVE-2017-7718
CVE-2017-7980
CVE    3
CVE-2016-9603
CVE-2017-7980
CVE-2017-7718
CPE    2
cpe:/a:xen:xen
cpe:/o:suse:suse_linux_enterprise_server:11:sp4

© SecPod Technologies