File _patchinfo of Package patchinfo.10697
<patchinfo incident="10697">
<issue tracker="bnc" id="1027519">Xen: Missing upstream bug fixes</issue>
<issue tracker="bnc" id="1123157">VUL-0: CVE-2019-6778: xen: A heap buffer overflow in tcp_emu() found in slirp</issue>
<issue tracker="bnc" id="1056336">VUL-0: CVE-2017-13672: xen: vga: OOB read access during display update</issue>
<issue tracker="bnc" id="1126140">VUL-0: xen: XSA-284: grant table transfer issues on large hosts</issue>
<issue tracker="bnc" id="1126141">VUL-0: xen: XSA-285: race with pass-through device hotplug</issue>
<issue tracker="bnc" id="1114423">VUL-0: CVE-2018-18849: xen: QEMU: lsi53c895a: OOB msg buffer access leads to DoS</issue>
<issue tracker="bnc" id="1108940">XEN SLE12-SP1 domU hang on SLE12-SP3 HV</issue>
<issue tracker="bnc" id="1126201">VUL-0: xen: XSA-293: x86: PV kernel context switch corruption</issue>
<issue tracker="bnc" id="1111007">VUL-0: CVE-2018-17958: xen: rtl8139: integer overflow leads to buffer overflow</issue>
<issue tracker="bnc" id="1114988">VUL-0: CVE-2018-19967: xen: guest use of HLE constructs may lock up host (XSA-282)</issue>
<issue tracker="bnc" id="1117756">VUL-0: CVE-2018-19665: xen: Integer overflow in Bluetooth routines allows memory corruption</issue>
<issue tracker="bnc" id="1105528">xpti=no-dom0 not working as expected</issue>
<issue tracker="bnc" id="1129623">VUL-1: CVE-2019-9824: xen: information leakage in tcp_emu() due to uninitialized stack variables</issue>
<issue tracker="bnc" id="1115040">VUL-0: CVE-2018-19961 CVE-2018-19962: xen: insufficient TLB flushing / improper large page mappings with AMD IOMMUs (XSA-275)</issue>
<issue tracker="bnc" id="1115047">VUL-0: CVE-2018-19966 : xen: Fix for XSA-240 conflicts with shadow paging (XSA-280)</issue>
<issue tracker="bnc" id="1110924">VUL-0: CVE-2018-10839: xen: ne2000: integer overflow leads to buffer overflow issue</issue>
<issue tracker="bnc" id="1115045">VUL-0: CVE-2018-19965 : xen: x86: DoS from attempting to use INVPCID with a non-canonical addresses (XSA-279)</issue>
<issue tracker="bnc" id="1127400">VUL-0: xen: XSA-294: x86 shadow: Insufficient TLB flushing when using PCID</issue>
<issue tracker="bnc" id="1126198">VUL-0: xen: XSA-292: x86: insufficient TLB flushing when using PCID</issue>
<issue tracker="bnc" id="1126192">VUL-0: xen: XSA-287: x86: steal_page violates page_struct access discipline</issue>
<issue tracker="bnc" id="1111014">VUL-0: CVE-2018-17963: xen: net: ignore packets with large size</issue>
<issue tracker="bnc" id="1126196">VUL-0: xen: XSA-290: missing preemption in x86 PV page table unvalidation</issue>
<issue tracker="bnc" id="1126195">VUL-0: EMBARGOED: xen: XSA-288: x86: Inconsistent PV IOMMU discipline</issue>
<issue tracker="bnc" id="1112188">VUL-0: CVE-2018-18438: xen: Qemu: Integer overflow in ccid_card_vscard_read() allows memory corruption</issue>
<issue tracker="bnc" id="1111011">VUL-0: CVE-2018-17962: xen: pcnet: integer overflow leads to buffer overflow</issue>
<issue tracker="cve" id="2018-19965"/>
<issue tracker="cve" id="2018-10839"/>
<issue tracker="cve" id="2017-13672"/>
<issue tracker="cve" id="2018-17963"/>
<issue tracker="cve" id="2018-17962"/>
<issue tracker="cve" id="2019-6778"/>
<issue tracker="cve" id="2019-9824"/>
<issue tracker="cve" id="2018-19967"/>
<issue tracker="cve" id="2018-19966"/>
<issue tracker="cve" id="2018-18849"/>
<issue tracker="cve" id="2018-19962"/>
<issue tracker="cve" id="2018-18438"/>
<issue tracker="cve" id="2018-19961"/>
<issue tracker="cve" id="2018-19665"/>
<issue tracker="cve" id="2018-17958"/>
<category>security</category>
<rating>important</rating>
<packager>charlesa</packager>
<description>This update for xen fixes the following issues:
Security issues fixed:
- CVE-2019-6778: Fixed a heap buffer overflow in tcp_emu() found in slirp (bsc#1123157).
- CVE-2017-13672: Fixed an out of bounds read access during display update (bsc#1056336).
- Fixed an issue which could allow malicious or buggy guests with passed through PCI devices to be able to
escalate their privileges, crash the host, or access data belonging to other guests. Additionally memory
leaks were also possible (bsc#1126140)
- Fixed a race condition issue which could allow malicious PV guests to escalate their privilege to that
of the hypervisor (bsc#1126141).
- CVE-2018-18849: Fixed an out of bounds msg buffer access which could lead to denial of service (bsc#1114423).
- Fixed an issue which could allow a malicious unprivileged guest userspace process to escalate its privilege
to that of other userspace processes in the same guest and potentially thereby to that
of the guest operating system (bsc#1126201).
- CVE-2018-17958: Fixed an integer overflow leading to a buffer overflow in the
rtl8139 component (bsc#1111007)
- CVE-2018-19967: Fixed HLE constructs that allowed guests to lock up the host,
resulting in a Denial of Service (DoS). (XSA-282) (bsc#1114988)
- CVE-2018-19665: Fixed an integer overflow resulting in memory corruption in
various Bluetooth functions, allowing this to crash qemu process resulting in
Denial of Service (DoS). (bsc#1117756).
- CVE-2019-9824: Fixed an information leak in SLiRP networking implementation which could allow a user/process
to read uninitialised stack memory contents (bsc#1129623).
- CVE-2018-19961, CVE-2018-19962: Fixed an issue related to insufficient TLB
flushing with AMD IOMMUs, which potentially allowed a guest to escalate its
privileges, may cause a Denial of Service (DoS) affecting the entire host, or
may be able to access data it is not supposed to access. (XSA-275)
(bsc#1115040)
- CVE-2018-19966: Fixed an issue related to a previous fix for XSA-240, which
conflicted with shadow paging and allowed a guest to cause Xen to crash,
resulting in a Denial of Service (DoS) (XSA-280) (bsc#1115047).
- CVE-2018-10839: Fixed an integer overflow leading to a buffer overflow in
the ne2000 component (bsc#1110924).
- CVE-2018-19965: Fixed an issue related to the INVPCID instruction in case
non-canonical addresses are accessed, which may allow a guest to cause Xen to
crash, resulting in a Denial of Service (DoS) affecting the entire host.
(XSA-279) (bsc#1115045).
- Fixed an issue which could allow malicious 64bit PV guests to cause a host crash (bsc#1127400).
- Fixed an issue which could allow malicious PV guests may cause a host crash or
gain access to data pertaining to other guests.Additionally, vulnerable configurations
are likely to be unstable even in the absence of an attack (bsc#1126198).
- Fixed multiple access violations introduced by XENMEM_exchange hypercall which could allow
a single PV guest to leak arbitrary amounts of memory, leading to a denial of service (bsc#1126192).
- CVE-2018-17963: Fixed an integer overflow in relation to large packet sizes,
leading to a denial of service (DoS). (bsc#1111014).
- Fixed an issue which could allow a malicious or buggy x86 PV guest kernels can mount a Denial of Service
attack affecting the whole system (bsc#1126196).
- Fixed an issue which could allow an untrusted PV domain with access to a physical device to DMA into its own
pagetables leading to privilege escalation (bsc#1126195).
- CVE-2018-17962: Fixed an integer overflow leading to a buffer overflow in the
pcnet component (bsc#1111011)
- CVE-2018-18438: Fixed an integer overflow in ccid_card_vscard_read function which could lead to memory corruption (bsc#1112188).
Other issues fixed:
- Upstream bug fixes (bsc#1027519)
- Fixed an issue where XEN SLE12-SP1 domU hangs on SLE12-SP3 HV1108940 (bsc#1108940).
</description>
<summary>Security update for xen</summary>
</patchinfo>