[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

SUSE-SU-2017:1770-1 -- SLES xen

ID: oval:org.secpod.oval:def:89044810Date: (C)2021-07-20   (M)2024-01-29
Class: PATCHFamily: unix




This update for xen fixes several issues. These security issues were fixed: - blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests - Page transfer might have allowed PV guest to elevate privilege - Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation - Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under - Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges - Grant table operations mishandled reference counts allowing malicious guests to escape - CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service by leveraging an incorrect return value - CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service by repeatedly starting and stopping audio capture - CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS . - CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS - CVE-2017-9374: Missing free of "s-ipacket", causes a host memory leak, allowing for DoS - CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service via the message ring page count - Missing NULL pointer check in event channel poll allows guests to DoS the host These non-security issues were fixed: - bsc#1032148: Ensure that time doesn"t goes backwards during live migration of HVM domU - bsc#1031460: Fixed DomU Live Migration - bsc#1014136: Fixed kdump SLES12-SP2 - bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed

Platform:
SUSE Linux Enterprise Server 11 SP4
Product:
xen
Reference:
SUSE-SU-2017:1770-1
CVE-2017-8112
CVE-2017-8309
CVE-2017-8905
CVE-2017-9330
CVE-2017-9374
CVE-2017-9503
CVE    6
CVE-2017-8905
CVE-2017-9374
CVE-2017-8112
CVE-2017-8309
...
CPE    2
cpe:/a:xen:xen
cpe:/o:suse:suse_linux_enterprise_server:11:sp4

© SecPod Technologies