|Category:||SuSE Local Security Checks|
|Title:||SUSE: Security Advisory (SUSE-SU-2019:2960-1)|
|Summary:||The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2019:2960-1 advisory.|
The remote host is missing an update for the 'xen' package(s) announced via the SUSE-SU-2019:2960-1 advisory.
This update for xen fixes the following issues:
CVE-2018-12207: Untrusted virtual machines on Intel CPUs could exploit a
race condition in the Instruction Fetch Unit of the Intel CPU to cause a
Machine Exception during Page Size Change, causing the CPU core to be
CVE-2019-11135: Aborting an asynchronous TSX operation on Intel CPUs
with Transactional Memory support could be used to facilitate
sidechannel information leaks out of microarchitectural buffers, similar
to the previously described 'Microarchitectural Data Sampling' attack.
CVE-2019-18425: 32-bit PV guest user mode could elevate its privileges
of the guest kernel. (bsc#1154456).
CVE-2019-18421: A malicious PV guest administrator may have been able to
escalate their privilege to that of the host. (bsc#1154458).
CVE-2019-18420: Malicious x86 PV guests may have caused a hypervisor
crash, resulting in a Denial of Service (Dos). (bsc#1154448)
'xen' package(s) on SUSE Linux Enterprise Module for Server Applications 15, SUSE Linux Enterprise Module for Basesystem 15
Please install the updated package(s).
Common Vulnerability Exposure (CVE) ID: CVE-2018-12207|
Common Vulnerability Exposure (CVE) ID: CVE-2019-11135
Common Vulnerability Exposure (CVE) ID: CVE-2019-18420
Common Vulnerability Exposure (CVE) ID: CVE-2019-18421
Common Vulnerability Exposure (CVE) ID: CVE-2019-18424
Common Vulnerability Exposure (CVE) ID: CVE-2019-18425
|Copyright||Copyright (C) 2021 Greenbone Networks GmbH|
|This is only one of 97459 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.