VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server 12 SP3

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3

Vulnerabilities (48)

  • CVE-2018-18849Mar 17, 2019
    affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1

    In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.

  • CVE-2018-19966Dec 8, 2018
    affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be

  • CVE-2018-19965Dec 8, 2018
    affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1

    An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a

  • CVE-2018-19962Dec 8, 2018
    affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1

    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.

  • CVE-2018-19961Dec 8, 2018
    affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1

    An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.

  • CVE-2018-18883Nov 1, 2018
    affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1

    An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.

  • CVE-2018-17963Oct 9, 2018
    affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2

    qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.

  • CVE-2018-15470Aug 17, 2018
    affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2

    An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpres

  • CVE-2018-15469Aug 17, 2018
    affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2

    An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hyperc

  • CVE-2018-15468Aug 17, 2018
    affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2

    An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably n

  • CVE-2018-3646Aug 14, 2018
    affected < 4.9.2_10-3.41.1fixed 4.9.2_10-3.41.1

    Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis

  • CVE-2018-12893Jul 2, 2018
    affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2

    An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can

  • CVE-2018-12892Jul 2, 2018
    affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2

    An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supp

  • CVE-2018-12891Jul 2, 2018
    affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2

    An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing

  • CVE-2018-3665Jun 21, 2018
    affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2

    System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.

  • CVE-2018-11806Jun 13, 2018
    affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2

    m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.

  • CVE-2018-3639May 22, 2018
    affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1

    Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka

  • CVE-2018-10982May 10, 2018
    affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1

    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC

  • CVE-2018-10981May 10, 2018
    affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1

    An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.

  • CVE-2018-8897May 8, 2018
    affected < 4.9.2_04-3.29.1fixed 4.9.2_04-3.29.1

    A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP

Page 1 of 3