rpm package
suse/xen&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP3
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3
Vulnerabilities (144)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2018-19961 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes. | ||
| CVE-2018-18883 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Nov 1, 2018 | An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted. | ||
| CVE-2018-17963 | — | < 4.9.3_03-3.44.2 | 4.9.3_03-3.44.2 | Oct 9, 2018 | qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. | ||
| CVE-2018-15470 | — | < 4.9.3_03-3.44.2 | 4.9.3_03-3.44.2 | Aug 17, 2018 | An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpres | ||
| CVE-2018-15469 | — | < 4.9.3_03-3.44.2 | 4.9.3_03-3.44.2 | Aug 17, 2018 | An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hyperc | ||
| CVE-2018-15468 | — | < 4.9.3_03-3.44.2 | 4.9.3_03-3.44.2 | Aug 17, 2018 | An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably n | ||
| CVE-2018-3646 | — | < 4.9.2_10-3.41.1 | 4.9.2_10-3.41.1 | Aug 14, 2018 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis | ||
| CVE-2018-12893 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jul 2, 2018 | An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can | ||
| CVE-2018-12892 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jul 2, 2018 | An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supp | ||
| CVE-2018-12891 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jul 2, 2018 | An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing | ||
| CVE-2018-3665 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jun 21, 2018 | System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel. | ||
| CVE-2018-11806 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jun 13, 2018 | m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams. | ||
| CVE-2018-3639 | — | < 4.9.2_06-3.32.1 | 4.9.2_06-3.32.1 | May 22, 2018 | Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka | ||
| CVE-2018-10982 | — | < 4.9.2_06-3.32.1 | 4.9.2_06-3.32.1 | May 10, 2018 | An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC | ||
| CVE-2018-10981 | — | < 4.9.2_06-3.32.1 | 4.9.2_06-3.32.1 | May 10, 2018 | An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. | ||
| CVE-2018-8897 | — | < 4.9.2_04-3.29.1 | 4.9.2_04-3.29.1 | May 8, 2018 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP | ||
| CVE-2018-10472 | — | < 4.9.2_04-3.29.1 | 4.9.2_04-3.29.1 | Apr 27, 2018 | An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot. | ||
| CVE-2018-10471 | — | < 4.9.2_04-3.29.1 | 4.9.2_04-3.29.1 | Apr 27, 2018 | An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754. | ||
| CVE-2018-7542 | — | < 4.9.2_04-3.29.1 | 4.9.2_04-3.29.1 | Feb 27, 2018 | An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC. | ||
| CVE-2018-7541 | — | < 4.9.2_04-3.29.1 | 4.9.2_04-3.29.1 | Feb 27, 2018 | An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1. |
- CVE-2018-19961Dec 8, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
- CVE-2018-18883Nov 1, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.
- CVE-2018-17963Oct 9, 2018affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
- CVE-2018-15470Aug 17, 2018affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2
An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpres
- CVE-2018-15469Aug 17, 2018affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2
An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hyperc
- CVE-2018-15468Aug 17, 2018affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2
An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably n
- CVE-2018-3646Aug 14, 2018affected < 4.9.2_10-3.41.1fixed 4.9.2_10-3.41.1
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis
- CVE-2018-12893Jul 2, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can
- CVE-2018-12892Jul 2, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supp
- CVE-2018-12891Jul 2, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing
- CVE-2018-3665Jun 21, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
- CVE-2018-11806Jun 13, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
- CVE-2018-3639May 22, 2018affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka
- CVE-2018-10982May 10, 2018affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC
- CVE-2018-10981May 10, 2018affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.
- CVE-2018-8897May 8, 2018affected < 4.9.2_04-3.29.1fixed 4.9.2_04-3.29.1
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP
- CVE-2018-10472Apr 27, 2018affected < 4.9.2_04-3.29.1fixed 4.9.2_04-3.29.1
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.
- CVE-2018-10471Apr 27, 2018affected < 4.9.2_04-3.29.1fixed 4.9.2_04-3.29.1
An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.
- CVE-2018-7542Feb 27, 2018affected < 4.9.2_04-3.29.1fixed 4.9.2_04-3.29.1
An issue was discovered in Xen 4.8.x through 4.10.x allowing x86 PVH guest OS users to cause a denial of service (NULL pointer dereference and hypervisor crash) by leveraging the mishandling of configurations that lack a Local APIC.
- CVE-2018-7541Feb 27, 2018affected < 4.9.2_04-3.29.1fixed 4.9.2_04-3.29.1
An issue was discovered in Xen through 4.10.x allowing guest OS users to cause a denial of service (hypervisor crash) or gain privileges by triggering a grant-table transition from v2 to v1.
Page 6 of 8