[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2017:3242-1 -- SLES xen

ID: oval:org.secpod.oval:def:89044880Date: (C)2021-07-20   (M)2024-01-29
Class: PATCHFamily: unix




This update for xen fixes several issues. These security issues were fixed: - bsc#1068187: Failure to recognize errors in the Populate on Demand code allowed for DoS - bsc#1068191: Missing p2m error checking in PoD code allowed unprivileged guests to retain a writable mapping of freed memory leading to information leaks, privilege escalation or DoS . - CVE-2017-15289: The mode4and5 write functions allowed local OS guest privileged users to cause a denial of service via vectors related to dst calculation - CVE-2017-15597: A grant copy operation being done on a grant of a dying domain allowed a malicious guest administrator to corrupt hypervisor memory, allowing for DoS or potentially privilege escalation and information leaks . - CVE-2017-15595: x86 PV guest OS users were able to cause a DoS or possibly gain privileges via crafted page-table stacking . - CVE-2017-15592: x86 HVM guest OS users were able to cause a DoS or possibly gain privileges because self-linear shadow mappings were mishandled for translated guests . - CVE-2017-13672: The VGA display emulator support allowed local guest OS privileged users to cause a denial of service via vectors involving display update This non-security issue was fixed: - bsc#1055047: Fixed --initrd-inject option in virt-install

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
xen
Reference:
SUSE-SU-2017:3242-1
CVE-2017-13672
CVE-2017-15289
CVE-2017-15592
CVE-2017-15595
CVE-2017-15597
CVE    5
CVE-2017-15289
CVE-2017-15597
CVE-2017-13672
CVE-2017-15595
...
CPE    2
cpe:/a:xen:xen
cpe:/o:suse:suse_linux_enterprise_server:11:sp4

© SecPod Technologies