Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12:Update
patchinfo.10697
_patchinfo
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _patchinfo of Package patchinfo.10697
<patchinfo incident="10697"> <issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue> <issue tracker="bnc" id="1123157">VUL-0: CVE-2019-6778: xen: A heap buffer overflow in tcp_emu() found in slirp</issue> <issue tracker="bnc" id="1056336">VUL-0: CVE-2017-13672: xen: vga: OOB read access during display update</issue> <issue tracker="bnc" id="1126140">VUL-0: xen: XSA-284: grant table transfer issues on large hosts</issue> <issue tracker="bnc" id="1126141">VUL-0: xen: XSA-285: race with pass-through device hotplug</issue> <issue tracker="bnc" id="1114423">VUL-0: CVE-2018-18849: xen: QEMU: lsi53c895a: OOB msg buffer access leads to DoS</issue> <issue tracker="bnc" id="1108940">XEN SLE12-SP1 domU hang on SLE12-SP3 HV</issue> <issue tracker="bnc" id="1126201">VUL-0: xen: XSA-293: x86: PV kernel context switch corruption</issue> <issue tracker="bnc" id="1111007">VUL-0: CVE-2018-17958: xen: rtl8139: integer overflow leads to buffer overflow</issue> <issue tracker="bnc" id="1114988">VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282)</issue> <issue tracker="bnc" id="1117756">VUL-0: CVE-2018-19665: xen: Integer overflow in Bluetooth routines allows memory corruption</issue> <issue tracker="bnc" id="1105528">xpti=no-dom0 not working as expected</issue> <issue tracker="bnc" id="1129623">VUL-1: CVE-2019-9824: xen: information leakage in tcp_emu() due to uninitialized stack variables</issue> <issue tracker="bnc" id="1115040">VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)</issue> <issue tracker="bnc" id="1115047">VUL-0: CVE-2018-19966 : xen: Fix for XSA-240 conflicts with shadow paging (XSA-280)</issue> <issue tracker="bnc" id="1110924">VUL-0: CVE-2018-10839: xen: ne2000: integer overflow leads to buffer overflow issue</issue> <issue tracker="bnc" id="1115045">VUL-0: CVE-2018-19965 : xen: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279)</issue> <issue tracker="bnc" id="1127400">VUL-0: xen: XSA-294: x86 shadow: Insufficient TLB flushing when using PCID</issue> <issue tracker="bnc" id="1126198">VUL-0: xen: XSA-292: x86: insufficient TLB flushing when using PCID</issue> <issue tracker="bnc" id="1126192">VUL-0: xen: XSA-287: x86: steal_page violates page_struct access discipline</issue> <issue tracker="bnc" id="1111014">VUL-0: CVE-2018-17963: xen: net: ignore packets with large size</issue> <issue tracker="bnc" id="1126196">VUL-0: xen: XSA-290: missing preemption in x86 PV page table unvalidation</issue> <issue tracker="bnc" id="1126195">VUL-0: EMBARGOED: xen: XSA-288: x86: Inconsistent PV IOMMU discipline</issue> <issue tracker="bnc" id="1112188">VUL-0: CVE-2018-18438: xen: Qemu: Integer overflow in ccid_card_vscard_read() allows memory corruption</issue> <issue tracker="bnc" id="1111011">VUL-0: CVE-2018-17962: xen: pcnet: integer overflow leads to buffer overflow</issue> <issue tracker="cve" id="2018-19965"/> <issue tracker="cve" id="2018-10839"/> <issue tracker="cve" id="2017-13672"/> <issue tracker="cve" id="2018-17963"/> <issue tracker="cve" id="2018-17962"/> <issue tracker="cve" id="2019-6778"/> <issue tracker="cve" id="2019-9824"/> <issue tracker="cve" id="2018-19967"/> <issue tracker="cve" id="2018-19966"/> <issue tracker="cve" id="2018-18849"/> <issue tracker="cve" id="2018-19962"/> <issue tracker="cve" id="2018-18438"/> <issue tracker="cve" id="2018-19961"/> <issue tracker="cve" id="2018-19665"/> <issue tracker="cve" id="2018-17958"/> <category>security</category> <rating>important</rating> <packager>charlesa</packager> <description>This update for xen fixes the following issues: Security issues fixed: - CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157). - CVE-2017-13672: Fixed an out of bounds read access during display update (bsc#1056336). - Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to be able to escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory leaks were also possible (bsc#1126140) - Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that of the hypervisor (bsc#1126141). - CVE-2018-18849: Fixed an out of bounds msg buffer access which could lead to denial of service (bsc#1114423). - Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege to that of other userspace processes in the same guest and potentially thereby to that of the guest operating system (bsc#1126201). - CVE-2018-17958: Fixed an integer overflow leading to a buffer overflow in the rtl8139 component (bsc#1111007) - CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host, resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988) - CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in various Bluetooth functions, allowing this to crash qemu process resulting in Denial of Service (DoS). (bsc#1117756). - CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process to read uninitialised stack memory contents (bsc#1129623). - CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB flushing with AMD IOMMUs, which potentially allowed a guest to escalate its privileges, may cause a Denial of Service (DoS) affecting the entire host, or may be able to access data it is not supposed to access. (XSA-275) (bsc#1115040) - CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which conflicted with shadow paging and allowed a guest to cause Xen to crash, resulting in a Denial of Service (DoS) (XSA-280) (bsc#1115047). - CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in the ne2000 component (bsc#1110924). - CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case non-canonical addresses are accessed, which may allow a guest to cause Xen to crash, resulting in a Denial of Service (DoS) affecting the entire host. (XSA-279) (bsc#1115045). - Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400). - Fixed an issue which could allow malicious PV guests may cause a host crash or gain access to data pertaining to other guests.Additionally, vulnerable configurations are likely to be unstable even in the absence of an attack (bsc#1126198). - Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192). - CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes, leading to a denial of service (DoS). (bsc#1111014). - Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service attack affecting the whole system (bsc#1126196). - Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own pagetables leading to privilege escalation (bsc#1126195). - CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the pcnet component (bsc#1111011) - CVE-2018-18438: Fixed an integer overflow in ccid_card_vscard_read function which could lead to memory corruption (bsc#1112188). Other issues fixed: - Upstream bug fixes (bsc#1027519) - Fixed an issue where XEN SLE12-SP1 domU hangs on SLE12-SP3 HV1108940 (bsc#1108940). </description> <summary>Security update for xen</summary> </patchinfo>
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor