rpm package
suse/xen&distro=SUSE Linux Enterprise Software Development Kit 12 SP3
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3
Vulnerabilities (48)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2018-18849 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Mar 17, 2019 | In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value. | ||
| CVE-2018-19966 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be | ||
| CVE-2018-19965 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a | ||
| CVE-2018-19962 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones. | ||
| CVE-2018-19961 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes. | ||
| CVE-2018-18883 | — | < 4.9.3_03-3.47.1 | 4.9.3_03-3.47.1 | Nov 1, 2018 | An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted. | ||
| CVE-2018-17963 | — | < 4.9.3_03-3.44.2 | 4.9.3_03-3.44.2 | Oct 9, 2018 | qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. | ||
| CVE-2018-15470 | — | < 4.9.3_03-3.44.2 | 4.9.3_03-3.44.2 | Aug 17, 2018 | An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpres | ||
| CVE-2018-15469 | — | < 4.9.3_03-3.44.2 | 4.9.3_03-3.44.2 | Aug 17, 2018 | An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hyperc | ||
| CVE-2018-15468 | — | < 4.9.3_03-3.44.2 | 4.9.3_03-3.44.2 | Aug 17, 2018 | An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably n | ||
| CVE-2018-3646 | — | < 4.9.2_10-3.41.1 | 4.9.2_10-3.41.1 | Aug 14, 2018 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis | ||
| CVE-2018-12893 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jul 2, 2018 | An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can | ||
| CVE-2018-12892 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jul 2, 2018 | An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supp | ||
| CVE-2018-12891 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jul 2, 2018 | An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing | ||
| CVE-2018-3665 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jun 21, 2018 | System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel. | ||
| CVE-2018-11806 | — | < 4.9.2_08-3.35.2 | 4.9.2_08-3.35.2 | Jun 13, 2018 | m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams. | ||
| CVE-2018-3639 | — | < 4.9.2_06-3.32.1 | 4.9.2_06-3.32.1 | May 22, 2018 | Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka | ||
| CVE-2018-10982 | — | < 4.9.2_06-3.32.1 | 4.9.2_06-3.32.1 | May 10, 2018 | An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC | ||
| CVE-2018-10981 | — | < 4.9.2_06-3.32.1 | 4.9.2_06-3.32.1 | May 10, 2018 | An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request. | ||
| CVE-2018-8897 | — | < 4.9.2_04-3.29.1 | 4.9.2_04-3.29.1 | May 8, 2018 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP |
- CVE-2018-18849Mar 17, 2019affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
- CVE-2018-19966Dec 8, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be
- CVE-2018-19965Dec 8, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a
- CVE-2018-19962Dec 8, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
- CVE-2018-19961Dec 8, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
- CVE-2018-18883Nov 1, 2018affected < 4.9.3_03-3.47.1fixed 4.9.3_03-3.47.1
An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.
- CVE-2018-17963Oct 9, 2018affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
- CVE-2018-15470Aug 17, 2018affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2
An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpres
- CVE-2018-15469Aug 17, 2018affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2
An issue was discovered in Xen through 4.11.x. ARM never properly implemented grant table v2, either in the hypervisor or in Linux. Unfortunately, an ARM guest can still request v2 grant tables; they will simply not be properly set up, resulting in subsequent grant-related hyperc
- CVE-2018-15468Aug 17, 2018affected < 4.9.3_03-3.44.2fixed 4.9.3_03-3.44.2
An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably n
- CVE-2018-3646Aug 14, 2018affected < 4.9.2_10-3.41.1fixed 4.9.2_10-3.41.1
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis
- CVE-2018-12893Jul 2, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can
- CVE-2018-12892Jul 2, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supp
- CVE-2018-12891Jul 2, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing
- CVE-2018-3665Jun 21, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
- CVE-2018-11806Jun 13, 2018affected < 4.9.2_08-3.35.2fixed 4.9.2_08-3.35.2
m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
- CVE-2018-3639May 22, 2018affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka
- CVE-2018-10982May 10, 2018affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC
- CVE-2018-10981May 10, 2018affected < 4.9.2_06-3.32.1fixed 4.9.2_06-3.32.1
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.
- CVE-2018-8897May 8, 2018affected < 4.9.2_04-3.29.1fixed 4.9.2_04-3.29.1
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP
Page 1 of 3