SUSE-SU-2019:0020-1 -- SLES xenID: oval:org.secpod.oval:def:89003124 | Date: (C)2021-02-27 (M)2022-10-10 |
Class: PATCH | Family: unix |
This update for xen fixes the following issues: Security vulnerabilities fixed: - CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB flushing with AMD IOMMUs, which potentially allowed a guest to escalate its privileges, may cause a Denial of Service affecting the entire host, or may be able to access data it is not supposed to access. - CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case non-canonical addresses are accessed, which may allow a guest to cause Xen to crash, resulting in a Denial of Service affecting the entire host. - CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which conflicted with shadow paging and allowed a guest to cause Xen to crash, resulting in a Denial of Service . - CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in various Bluetooth functions, allowing this to crash qemu process resulting in Denial of Service . - CVE-2018-18849: Fixed an out of bounds memory access in the LSI53C895A SCSI host bus adapter emulation, which allowed a user and/or process to crash the qemu process resulting in a Denial of Service . Other bugs fixed: - Fixed an issue related to a domU hang on SLE12-SP3 HV - Fixed an issue with xpti=no-dom0 not working as expected - Fixed an issue with live migrations, which used to fail when spectre is enabled on xen boot cmdline - Upstream bug fixes
Platform: |
SUSE Linux Enterprise Server 12 SP2 |