rpm package
suse/xen&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP3
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3
Vulnerabilities (144)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-17340 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled. | ||
| CVE-2019-17341 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device. | ||
| CVE-2019-17342 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced. | ||
| CVE-2019-17343 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains. | ||
| CVE-2019-17344 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates. | ||
| CVE-2019-17345 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest. | ||
| CVE-2019-17346 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes. | ||
| CVE-2019-17347 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels). | ||
| CVE-2019-17348 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Oct 8, 2019 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching. | ||
| CVE-2019-12068 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Sep 24, 2019 | In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an | ||
| CVE-2019-15890 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Sep 6, 2019 | libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c. | ||
| CVE-2019-14378 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | Jul 29, 2019 | ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment. | ||
| CVE-2018-12130 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | May 30, 2019 | Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h | ||
| CVE-2018-12127 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | May 30, 2019 | Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: | ||
| CVE-2018-12126 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | May 30, 2019 | Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found | ||
| CVE-2019-11091 | — | < 4.9.4_04-3.56.2 | 4.9.4_04-3.56.2 | May 30, 2019 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c | ||
| CVE-2018-18849 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Mar 17, 2019 | In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value. | ||
| CVE-2018-19966 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be | ||
| CVE-2018-19965 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a | ||
| CVE-2018-19962 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones. |
- CVE-2019-17340Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.
- CVE-2019-17341Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.
- CVE-2019-17342Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.
- CVE-2019-17343Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.
- CVE-2019-17344Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.
- CVE-2019-17345Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest.
- CVE-2019-17346Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.
- CVE-2019-17347Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).
- CVE-2019-17348Oct 8, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.
- CVE-2019-12068Sep 24, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an
- CVE-2019-15890Sep 6, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
- CVE-2019-14378Jul 29, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.
- CVE-2018-12130May 30, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h
- CVE-2018-12127May 30, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:
- CVE-2018-12126May 30, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found
- CVE-2019-11091May 30, 2019affected < 4.9.4_04-3.56.2fixed 4.9.4_04-3.56.2
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c
- CVE-2018-18849Mar 17, 2019affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
- CVE-2018-19966Dec 8, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be
- CVE-2018-19965Dec 8, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a
- CVE-2018-19962Dec 8, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
Page 5 of 8