SUSE-SU-2018:2056-1

Source
https://www.suse.com/support/update/announcement/2018/suse-su-20182056-1/
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2018:2056-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2018:2056-1
Related
Published
2018-07-25T09:01:09Z
Modified
2018-07-25T09:01:09Z
Summary
Security update for xen
Details

This update for xen fixes the following issues:

Security issues fixed:

  • CVE-2018-12617: Fix integer overflow that causes segmentation fault in qmpguestfileread() with gmalloc() (bsc#1098744).
  • CVE-2018-3665: Fix Lazy FP Save/Restore issue (XSA-267) (bsc#1095242).
  • CVE-2018-11806: Fix heap buffer overflow while reassembling fragmented datagrams (bsc#1096224).
  • CVE-2018-12891: Fix possible Denial of Service (DoS) via certain PV MMU operations that affect the entire host (XSA-264) (bsc#1097521).
  • CVE-2018-12893: Fix crash/Denial of Service (DoS) via safety check (XSA-265) (bsc#1097522).

Bug fixes:

  • bsc#1079730: Fix failed 'write' lock.
  • bsc#1027519: Add upstream patches from January.
References

Affected packages

SUSE:Linux Enterprise Server 12-LTSS / xen

Package

Name
xen
Purl
purl:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.4.4_34-22.71.2

Ecosystem specific

{
    "binaries": [
        {
            "xen-tools-domU": "4.4.4_34-22.71.2",
            "xen-kmp-default": "4.4.4_34_k3.12.61_52.136-22.71.2",
            "xen-libs": "4.4.4_34-22.71.2",
            "xen-doc-html": "4.4.4_34-22.71.2",
            "xen-libs-32bit": "4.4.4_34-22.71.2",
            "xen-tools": "4.4.4_34-22.71.2",
            "xen": "4.4.4_34-22.71.2"
        }
    ]
}