Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-10913
Vulnerability from cvelistv5
Published
2017-07-05 01:00
Modified
2024-08-05 17:50
Severity ?
EPSS score ?
1.20%
(0.7777)
Summary
The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T17:50:12.743Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "1038722", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1038722", }, { name: "GLSA-201708-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201708-03", }, { name: "DSA-3969", tags: [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred", ], url: "http://www.debian.org/security/2017/dsa-3969", }, { name: "99411", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/99411", }, { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://xenbits.xen.org/xsa/advisory-218.html", }, { name: "GLSA-201710-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred", ], url: "https://security.gentoo.org/glsa/201710-17", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2017-07-04T00:00:00", descriptions: [ { lang: "en", value: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2017-11-03T18:57:01", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { name: "1038722", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1038722", }, { name: "GLSA-201708-03", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201708-03", }, { name: "DSA-3969", tags: [ "vendor-advisory", "x_refsource_DEBIAN", ], url: "http://www.debian.org/security/2017/dsa-3969", }, { name: "99411", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/99411", }, { tags: [ "x_refsource_CONFIRM", ], url: "https://xenbits.xen.org/xsa/advisory-218.html", }, { name: "GLSA-201710-17", tags: [ "vendor-advisory", "x_refsource_GENTOO", ], url: "https://security.gentoo.org/glsa/201710-17", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-10913", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1038722", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038722", }, { name: "GLSA-201708-03", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201708-03", }, { name: "DSA-3969", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3969", }, { name: "99411", refsource: "BID", url: "http://www.securityfocus.com/bid/99411", }, { name: "https://xenbits.xen.org/xsa/advisory-218.html", refsource: "CONFIRM", url: "https://xenbits.xen.org/xsa/advisory-218.html", }, { name: "GLSA-201710-17", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201710-17", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2017-10913", datePublished: "2017-07-05T01:00:00", dateReserved: "2017-07-04T00:00:00", dateUpdated: "2024-08-05T17:50:12.743Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2017-10913\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-07-05T01:29:00.610\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.\"},{\"lang\":\"es\",\"value\":\"La característica de tabla grant en Xen, hasta las versiones 4.8.x, ofrece información de mapeo falsa en ciertos casos de llamadas simultáneas de desasignación, lo que permite que atacantes del backend obtengan información sensible o adquieran privilegios. Esto también se conoce como XSA-218, fallo 1.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.8.1\",\"matchCriteriaId\":\"7494A471-EEFC-44F4-96B1-FDBA3B780313\"}]}]}],\"references\":[{\"url\":\"http://www.debian.org/security/2017/dsa-3969\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/99411\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038722\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201708-03\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://security.gentoo.org/glsa/201710-17\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://xenbits.xen.org/xsa/advisory-218.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://www.debian.org/security/2017/dsa-3969\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/99411\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038722\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201708-03\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201710-17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://xenbits.xen.org/xsa/advisory-218.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]}]}}", }, }
suse-su-2017:1812-1
Vulnerability from csaf_suse
Published
2017-07-07 09:25
Modified
2017-07-07 09:25
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-10911: blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- CVE-2017-10912: Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- CVE-2017-10913, CVE-2017-10914: Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- CVE-2017-10915: Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- CVE-2017-10917: Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
- CVE-2017-10918: Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- CVE-2017-10922, CVE-2017-10921, CVE-2017-10920: Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-10916: PKRU and BND* leakage between vCPU-s might have leaked information to other guests (XSA-220, bsc#1042923)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)
- CVE-2017-9374: Missing free of 's->ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)
These non-security issues were fixed:
- bsc#1031460: Fixed DomU Live Migration
- bsc#1014136: Fixed kdump SLES12-SP2
- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed
Patchnames
SUSE-OpenStack-Cloud-6-2017-1121,SUSE-SLE-SAP-12-SP1-2017-1121,SUSE-SLE-SERVER-12-SP1-2017-1121
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for xen", title: "Title of the patch", }, { category: "description", text: "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-10911: blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)\n- CVE-2017-10912: Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)\n- CVE-2017-10913, CVE-2017-10914: Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)\n- CVE-2017-10915: Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)\n- CVE-2017-10917: Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)\n- CVE-2017-10918: Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)\n- CVE-2017-10922, CVE-2017-10921, CVE-2017-10920: Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)\n- CVE-2017-10916: PKRU and BND* leakage between vCPU-s might have leaked information to other guests (XSA-220, bsc#1042923)\n- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)\n- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)\n- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)\n- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).\n- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)\n- CVE-2017-9374: Missing free of 's->ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)\n\nThese non-security issues were fixed:\n\n- bsc#1031460: Fixed DomU Live Migration\n- bsc#1014136: Fixed kdump SLES12-SP2\n- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed\n", title: "Description of the patch", }, { category: "details", text: "SUSE-OpenStack-Cloud-6-2017-1121,SUSE-SLE-SAP-12-SP1-2017-1121,SUSE-SLE-SERVER-12-SP1-2017-1121", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1812-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:1812-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20171812-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:1812-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-July/003016.html", }, { category: "self", summary: "SUSE Bug 1014136", url: "https://bugzilla.suse.com/1014136", }, { category: "self", summary: "SUSE Bug 1026236", url: "https://bugzilla.suse.com/1026236", }, { category: "self", summary: "SUSE Bug 1027519", url: "https://bugzilla.suse.com/1027519", }, { category: "self", summary: "SUSE Bug 1031460", url: "https://bugzilla.suse.com/1031460", }, { category: "self", summary: "SUSE Bug 1034845", url: "https://bugzilla.suse.com/1034845", }, { category: "self", summary: "SUSE Bug 1036470", url: "https://bugzilla.suse.com/1036470", }, { category: "self", summary: "SUSE Bug 1037243", url: "https://bugzilla.suse.com/1037243", }, { category: "self", summary: "SUSE Bug 1042160", url: "https://bugzilla.suse.com/1042160", }, { category: "self", summary: "SUSE Bug 1042863", url: "https://bugzilla.suse.com/1042863", }, { category: "self", summary: "SUSE Bug 1042882", url: "https://bugzilla.suse.com/1042882", }, { category: "self", summary: "SUSE Bug 1042893", url: "https://bugzilla.suse.com/1042893", }, { category: "self", summary: "SUSE Bug 1042915", url: "https://bugzilla.suse.com/1042915", }, { category: "self", summary: "SUSE Bug 1042923", url: "https://bugzilla.suse.com/1042923", }, { category: "self", summary: "SUSE Bug 1042924", url: "https://bugzilla.suse.com/1042924", }, { category: "self", summary: "SUSE Bug 1042931", url: "https://bugzilla.suse.com/1042931", }, { category: "self", summary: "SUSE Bug 1042938", url: "https://bugzilla.suse.com/1042938", }, { category: "self", summary: "SUSE Bug 1043074", url: "https://bugzilla.suse.com/1043074", }, { category: "self", summary: "SUSE Bug 1043297", url: "https://bugzilla.suse.com/1043297", }, { category: "self", summary: "SUSE CVE CVE-2017-10911 page", url: "https://www.suse.com/security/cve/CVE-2017-10911/", }, { category: "self", summary: "SUSE CVE CVE-2017-10912 page", url: "https://www.suse.com/security/cve/CVE-2017-10912/", }, { category: "self", summary: "SUSE CVE CVE-2017-10913 page", url: "https://www.suse.com/security/cve/CVE-2017-10913/", }, { category: "self", summary: "SUSE CVE CVE-2017-10914 page", url: "https://www.suse.com/security/cve/CVE-2017-10914/", }, { category: "self", summary: "SUSE CVE CVE-2017-10915 page", url: "https://www.suse.com/security/cve/CVE-2017-10915/", }, { category: "self", summary: "SUSE CVE CVE-2017-10916 page", url: "https://www.suse.com/security/cve/CVE-2017-10916/", }, { category: "self", summary: "SUSE CVE CVE-2017-10917 page", url: "https://www.suse.com/security/cve/CVE-2017-10917/", }, { category: "self", summary: "SUSE CVE CVE-2017-10918 page", url: "https://www.suse.com/security/cve/CVE-2017-10918/", }, { category: "self", summary: "SUSE CVE CVE-2017-10920 page", url: "https://www.suse.com/security/cve/CVE-2017-10920/", }, { category: "self", summary: "SUSE CVE CVE-2017-10921 page", url: "https://www.suse.com/security/cve/CVE-2017-10921/", }, { category: "self", summary: "SUSE CVE CVE-2017-10922 page", url: "https://www.suse.com/security/cve/CVE-2017-10922/", }, { category: "self", summary: "SUSE CVE CVE-2017-8112 page", url: "https://www.suse.com/security/cve/CVE-2017-8112/", }, { category: "self", summary: "SUSE CVE CVE-2017-8309 page", url: "https://www.suse.com/security/cve/CVE-2017-8309/", }, { category: "self", summary: "SUSE CVE CVE-2017-8905 page", url: "https://www.suse.com/security/cve/CVE-2017-8905/", }, { category: "self", summary: "SUSE CVE CVE-2017-9330 page", url: "https://www.suse.com/security/cve/CVE-2017-9330/", }, { category: "self", summary: "SUSE CVE CVE-2017-9374 page", url: "https://www.suse.com/security/cve/CVE-2017-9374/", }, { category: "self", summary: "SUSE CVE CVE-2017-9503 page", url: "https://www.suse.com/security/cve/CVE-2017-9503/", }, ], title: "Security update for xen", tracking: { current_release_date: "2017-07-07T09:25:46Z", generator: { date: "2017-07-07T09:25:46Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:1812-1", initial_release_date: "2017-07-07T09:25:46Z", revision_history: [ { date: "2017-07-07T09:25:46Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "xen-4.5.5_12-22.18.1.x86_64", product: { name: "xen-4.5.5_12-22.18.1.x86_64", product_id: "xen-4.5.5_12-22.18.1.x86_64", }, }, { category: "product_version", name: "xen-doc-html-4.5.5_12-22.18.1.x86_64", product: { name: "xen-doc-html-4.5.5_12-22.18.1.x86_64", product_id: "xen-doc-html-4.5.5_12-22.18.1.x86_64", }, }, { category: "product_version", name: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", product: { name: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", product_id: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", }, }, { category: "product_version", name: "xen-libs-4.5.5_12-22.18.1.x86_64", product: { name: "xen-libs-4.5.5_12-22.18.1.x86_64", product_id: "xen-libs-4.5.5_12-22.18.1.x86_64", }, }, { category: "product_version", name: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64", product: { name: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64", product_id: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64", }, }, { category: "product_version", name: "xen-tools-4.5.5_12-22.18.1.x86_64", product: { name: "xen-tools-4.5.5_12-22.18.1.x86_64", product_id: "xen-tools-4.5.5_12-22.18.1.x86_64", }, }, { category: "product_version", name: "xen-tools-domU-4.5.5_12-22.18.1.x86_64", product: { name: "xen-tools-domU-4.5.5_12-22.18.1.x86_64", product_id: "xen-tools-domU-4.5.5_12-22.18.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE OpenStack Cloud 6", product: { name: "SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6", product_identification_helper: { cpe: "cpe:/o:suse:suse-openstack-cloud:6", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12:sp1", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product: { name: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12:sp1", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "xen-4.5.5_12-22.18.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "xen-doc-html-4.5.5_12-22.18.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-doc-html-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", }, product_reference: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "xen-libs-4.5.5_12-22.18.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-libs-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "xen-tools-4.5.5_12-22.18.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-tools-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "xen-tools-domU-4.5.5_12-22.18.1.x86_64 as component of SUSE OpenStack Cloud 6", product_id: "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-tools-domU-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE OpenStack Cloud 6", }, { category: "default_component_of", full_product_name: { name: "xen-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "xen-doc-html-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-doc-html-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", }, product_reference: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "xen-libs-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-libs-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "xen-tools-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-tools-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "xen-tools-domU-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP1", product_id: "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-tools-domU-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12 SP1", }, { category: "default_component_of", full_product_name: { name: "xen-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-doc-html-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-doc-html-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", }, product_reference: "xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-libs-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-libs-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-libs-32bit-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-tools-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-tools-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-tools-domU-4.5.5_12-22.18.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP1-LTSS", product_id: "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", }, product_reference: "xen-tools-domU-4.5.5_12-22.18.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12 SP1-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2017-10911", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10911", }, ], notes: [ { category: "general", text: "The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10911", url: "https://www.suse.com/security/cve/CVE-2017-10911", }, { category: "external", summary: "SUSE Bug 1042863 for CVE-2017-10911", url: "https://bugzilla.suse.com/1042863", }, { category: "external", summary: "SUSE Bug 1043330 for CVE-2017-10911", url: "https://bugzilla.suse.com/1043330", }, { category: "external", summary: "SUSE Bug 1057378 for CVE-2017-10911", url: "https://bugzilla.suse.com/1057378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "moderate", }, ], title: "CVE-2017-10911", }, { cve: "CVE-2017-10912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10912", }, ], notes: [ { category: "general", text: "Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10912", url: "https://www.suse.com/security/cve/CVE-2017-10912", }, { category: "external", summary: "SUSE Bug 1042882 for CVE-2017-10912", url: "https://bugzilla.suse.com/1042882", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-10912", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10912", }, { cve: "CVE-2017-10913", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10913", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10913", url: "https://www.suse.com/security/cve/CVE-2017-10913", }, { category: "external", summary: "SUSE Bug 1042893 for CVE-2017-10913", url: "https://bugzilla.suse.com/1042893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10913", }, { cve: "CVE-2017-10914", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10914", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x has a race condition leading to a double free, which allows guest OS users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka XSA-218 bug 2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10914", url: "https://www.suse.com/security/cve/CVE-2017-10914", }, { category: "external", summary: "SUSE Bug 1042893 for CVE-2017-10914", url: "https://bugzilla.suse.com/1042893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10914", }, { cve: "CVE-2017-10915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10915", }, ], notes: [ { category: "general", text: "The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10915", url: "https://www.suse.com/security/cve/CVE-2017-10915", }, { category: "external", summary: "SUSE Bug 1042915 for CVE-2017-10915", url: "https://bugzilla.suse.com/1042915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10915", }, { cve: "CVE-2017-10916", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10916", }, ], notes: [ { category: "general", text: "The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10916", url: "https://www.suse.com/security/cve/CVE-2017-10916", }, { category: "external", summary: "SUSE Bug 1042923 for CVE-2017-10916", url: "https://bugzilla.suse.com/1042923", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 5.7, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "moderate", }, ], title: "CVE-2017-10916", }, { cve: "CVE-2017-10917", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10917", }, ], notes: [ { category: "general", text: "Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10917", url: "https://www.suse.com/security/cve/CVE-2017-10917", }, { category: "external", summary: "SUSE Bug 1042924 for CVE-2017-10917", url: "https://bugzilla.suse.com/1042924", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.9, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10917", }, { cve: "CVE-2017-10918", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10918", }, ], notes: [ { category: "general", text: "Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10918", url: "https://www.suse.com/security/cve/CVE-2017-10918", }, { category: "external", summary: "SUSE Bug 1042931 for CVE-2017-10918", url: "https://bugzilla.suse.com/1042931", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-10918", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10918", }, { cve: "CVE-2017-10920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10920", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10920", url: "https://www.suse.com/security/cve/CVE-2017-10920", }, { category: "external", summary: "SUSE Bug 1042938 for CVE-2017-10920", url: "https://bugzilla.suse.com/1042938", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-10920", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10920", }, { cve: "CVE-2017-10921", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10921", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10921", url: "https://www.suse.com/security/cve/CVE-2017-10921", }, { category: "external", summary: "SUSE Bug 1042938 for CVE-2017-10921", url: "https://bugzilla.suse.com/1042938", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10921", }, { cve: "CVE-2017-10922", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10922", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10922", url: "https://www.suse.com/security/cve/CVE-2017-10922", }, { category: "external", summary: "SUSE Bug 1042938 for CVE-2017-10922", url: "https://bugzilla.suse.com/1042938", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-10922", }, { cve: "CVE-2017-8112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8112", }, ], notes: [ { category: "general", text: "hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8112", url: "https://www.suse.com/security/cve/CVE-2017-8112", }, { category: "external", summary: "SUSE Bug 1036211 for CVE-2017-8112", url: "https://bugzilla.suse.com/1036211", }, { category: "external", summary: "SUSE Bug 1036470 for CVE-2017-8112", url: "https://bugzilla.suse.com/1036470", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "low", }, ], title: "CVE-2017-8112", }, { cve: "CVE-2017-8309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8309", }, ], notes: [ { category: "general", text: "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8309", url: "https://www.suse.com/security/cve/CVE-2017-8309", }, { category: "external", summary: "SUSE Bug 1037242 for CVE-2017-8309", url: "https://bugzilla.suse.com/1037242", }, { category: "external", summary: "SUSE Bug 1037243 for CVE-2017-8309", url: "https://bugzilla.suse.com/1037243", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-8309", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "low", }, ], title: "CVE-2017-8309", }, { cve: "CVE-2017-8905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8905", }, ], notes: [ { category: "general", text: "Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8905", url: "https://www.suse.com/security/cve/CVE-2017-8905", }, { category: "external", summary: "SUSE Bug 1034845 for CVE-2017-8905", url: "https://bugzilla.suse.com/1034845", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-8905", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "important", }, ], title: "CVE-2017-8905", }, { cve: "CVE-2017-9330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9330", }, ], notes: [ { category: "general", text: "QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9330", url: "https://www.suse.com/security/cve/CVE-2017-9330", }, { category: "external", summary: "SUSE Bug 1042159 for CVE-2017-9330", url: "https://bugzilla.suse.com/1042159", }, { category: "external", summary: "SUSE Bug 1042160 for CVE-2017-9330", url: "https://bugzilla.suse.com/1042160", }, { category: "external", summary: "SUSE Bug 1043157 for CVE-2017-9330", url: "https://bugzilla.suse.com/1043157", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-9330", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "low", }, ], title: "CVE-2017-9330", }, { cve: "CVE-2017-9374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9374", }, ], notes: [ { category: "general", text: "Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9374", url: "https://www.suse.com/security/cve/CVE-2017-9374", }, { category: "external", summary: "SUSE Bug 1043073 for CVE-2017-9374", url: "https://bugzilla.suse.com/1043073", }, { category: "external", summary: "SUSE Bug 1043074 for CVE-2017-9374", url: "https://bugzilla.suse.com/1043074", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "low", }, ], title: "CVE-2017-9374", }, { cve: "CVE-2017-9503", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9503", }, ], notes: [ { category: "general", text: "QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9503", url: "https://www.suse.com/security/cve/CVE-2017-9503", }, { category: "external", summary: "SUSE Bug 1043296 for CVE-2017-9503", url: "https://bugzilla.suse.com/1043296", }, { category: "external", summary: "SUSE Bug 1043297 for CVE-2017-9503", url: "https://bugzilla.suse.com/1043297", }, { category: "external", summary: "SUSE Bug 1043312 for CVE-2017-9503", url: "https://bugzilla.suse.com/1043312", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server 12 SP1-LTSS:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12 SP1:xen-tools-domU-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-doc-html-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-kmp-default-4.5.5_12_k3.12.74_60.64.45-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-32bit-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-libs-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-4.5.5_12-22.18.1.x86_64", "SUSE OpenStack Cloud 6:xen-tools-domU-4.5.5_12-22.18.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-07T09:25:46Z", details: "low", }, ], title: "CVE-2017-9503", }, ], }
suse-su-2017:1795-1
Vulnerability from csaf_suse
Published
2017-07-06 09:40
Modified
2017-07-06 09:40
Summary
Security update for xen
Notes
Title of the patch
Security update for xen
Description of the patch
This update for xen fixes several issues.
These security issues were fixed:
- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)
- CVE-2017-9374: Missing free of 's->ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)
- CVE-2017-10911: blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)
- CVE-2017-10912: Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)
- CVE-2017-10913, CVE-2017-10914: Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)
- CVE-2017-10915: Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)
- CVE-2017-10917: Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)
- CVE-2017-10918: Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)
- CVE-2017-10920, CVE-2017-10921, CVE-2017-10922: Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)
- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)
- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)
- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)
- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).
These non-security issues were fixed:
- bsc#1031460: Fixed DomU Live Migration
- bsc#1014136: Fixed kdump SLES12-SP2
- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed
- bsc#1032148: Ensure that time doesn't goes backwards during live migration of HVM domU
- bsc#1027519: Included various upstream patches
Patchnames
SUSE-SLE-SAP-12-2017-1118,SUSE-SLE-SERVER-12-2017-1118
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ document: { aggregate_severity: { namespace: "https://www.suse.com/support/security/rating/", text: "important", }, category: "csaf_security_advisory", csaf_version: "2.0", distribution: { text: "Copyright 2024 SUSE LLC. All rights reserved.", tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "en", notes: [ { category: "summary", text: "Security update for xen", title: "Title of the patch", }, { category: "description", text: "This update for xen fixes several issues.\n\nThese security issues were fixed:\n\n- CVE-2017-9503: The MegaRAID SAS 8708EM2 Host Bus Adapter emulation support was vulnerable to a null pointer dereference issue which allowed a privileged user inside guest to crash the Qemu process on the host resulting in DoS (bsc#1043297)\n- CVE-2017-9374: Missing free of 's->ipacket', causes a host memory leak, allowing for DoS (bsc#1043074)\n- CVE-2017-10911: blkif responses leaked backend stack data, which allowed unprivileged guest to obtain sensitive information from the host or other guests (XSA-216, bsc#1042863)\n- CVE-2017-10912: Page transfer might have allowed PV guest to elevate privilege (XSA-217, bsc#1042882)\n- CVE-2017-10913, CVE-2017-10914: Races in the grant table unmap code allowed for informations leaks and potentially privilege escalation (XSA-218, bsc#1042893)\n- CVE-2017-10915: Insufficient reference counts during shadow emulation allowed a malicious pair of guest to elevate their privileges to the privileges that XEN runs under (XSA-219, bsc#1042915)\n- CVE-2017-10917: Missing NULL pointer check in event channel poll allows guests to DoS the host (XSA-221, bsc#1042924)\n- CVE-2017-10918: Stale P2M mappings due to insufficient error checking allowed malicious guest to leak information or elevate privileges (XSA-222, bsc#1042931)\n- CVE-2017-10920, CVE-2017-10921, CVE-2017-10922: Grant table operations mishandled reference counts allowing malicious guests to escape (XSA-224, bsc#1042938)\n- CVE-2017-9330: USB OHCI Emulation in qemu allowed local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value (bsc#1042160)\n- CVE-2017-8309: Memory leak in the audio/audio.c allowed remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture (bsc#1037243)\n- CVE-2017-8112: hw/scsi/vmw_pvscsi.c allowed local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count (bsc#1036470)\n- CVE-2017-8905: Xen a failsafe callback, which might have allowed PV guest OS users to execute arbitrary code on the host OS (XSA-215, bsc#1034845).\n\nThese non-security issues were fixed:\n\n- bsc#1031460: Fixed DomU Live Migration\n- bsc#1014136: Fixed kdump SLES12-SP2\n- bsc#1026236: Equalized paravirtualized vs. fully virtualized migration speed\n- bsc#1032148: Ensure that time doesn't goes backwards during live migration of HVM domU\n- bsc#1027519: Included various upstream patches\n", title: "Description of the patch", }, { category: "details", text: "SUSE-SLE-SAP-12-2017-1118,SUSE-SLE-SERVER-12-2017-1118", title: "Patchnames", }, { category: "legal_disclaimer", text: "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", title: "Terms of use", }, ], publisher: { category: "vendor", contact_details: "https://www.suse.com/support/security/contact/", name: "SUSE Product Security Team", namespace: "https://www.suse.com/", }, references: [ { category: "external", summary: "SUSE ratings", url: "https://www.suse.com/support/security/rating/", }, { category: "self", summary: "URL of this CSAF notice", url: "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1795-1.json", }, { category: "self", summary: "URL for SUSE-SU-2017:1795-1", url: "https://www.suse.com/support/update/announcement/2017/suse-su-20171795-1/", }, { category: "self", summary: "E-Mail link for SUSE-SU-2017:1795-1", url: "https://lists.suse.com/pipermail/sle-security-updates/2017-July/003015.html", }, { category: "self", summary: "SUSE Bug 1014136", url: "https://bugzilla.suse.com/1014136", }, { category: "self", summary: "SUSE Bug 1026236", url: "https://bugzilla.suse.com/1026236", }, { category: "self", summary: "SUSE Bug 1027519", url: "https://bugzilla.suse.com/1027519", }, { category: "self", summary: "SUSE Bug 1031460", url: "https://bugzilla.suse.com/1031460", }, { category: "self", summary: "SUSE Bug 1032148", url: "https://bugzilla.suse.com/1032148", }, { category: "self", summary: "SUSE Bug 1034845", url: "https://bugzilla.suse.com/1034845", }, { category: "self", summary: "SUSE Bug 1036470", url: "https://bugzilla.suse.com/1036470", }, { category: "self", summary: "SUSE Bug 1037243", url: "https://bugzilla.suse.com/1037243", }, { category: "self", summary: "SUSE Bug 1042160", url: "https://bugzilla.suse.com/1042160", }, { category: "self", summary: "SUSE Bug 1042863", url: "https://bugzilla.suse.com/1042863", }, { category: "self", summary: "SUSE Bug 1042882", url: "https://bugzilla.suse.com/1042882", }, { category: "self", summary: "SUSE Bug 1042893", url: "https://bugzilla.suse.com/1042893", }, { category: "self", summary: "SUSE Bug 1042915", url: "https://bugzilla.suse.com/1042915", }, { category: "self", summary: "SUSE Bug 1042924", url: "https://bugzilla.suse.com/1042924", }, { category: "self", summary: "SUSE Bug 1042931", url: "https://bugzilla.suse.com/1042931", }, { category: "self", summary: "SUSE Bug 1042938", url: "https://bugzilla.suse.com/1042938", }, { category: "self", summary: "SUSE Bug 1043074", url: "https://bugzilla.suse.com/1043074", }, { category: "self", summary: "SUSE Bug 1043297", url: "https://bugzilla.suse.com/1043297", }, { category: "self", summary: "SUSE CVE CVE-2017-10911 page", url: "https://www.suse.com/security/cve/CVE-2017-10911/", }, { category: "self", summary: "SUSE CVE CVE-2017-10912 page", url: "https://www.suse.com/security/cve/CVE-2017-10912/", }, { category: "self", summary: "SUSE CVE CVE-2017-10913 page", url: "https://www.suse.com/security/cve/CVE-2017-10913/", }, { category: "self", summary: "SUSE CVE CVE-2017-10914 page", url: "https://www.suse.com/security/cve/CVE-2017-10914/", }, { category: "self", summary: "SUSE CVE CVE-2017-10915 page", url: "https://www.suse.com/security/cve/CVE-2017-10915/", }, { category: "self", summary: "SUSE CVE CVE-2017-10917 page", url: "https://www.suse.com/security/cve/CVE-2017-10917/", }, { category: "self", summary: "SUSE CVE CVE-2017-10918 page", url: "https://www.suse.com/security/cve/CVE-2017-10918/", }, { category: "self", summary: "SUSE CVE CVE-2017-10920 page", url: "https://www.suse.com/security/cve/CVE-2017-10920/", }, { category: "self", summary: "SUSE CVE CVE-2017-10921 page", url: "https://www.suse.com/security/cve/CVE-2017-10921/", }, { category: "self", summary: "SUSE CVE CVE-2017-10922 page", url: "https://www.suse.com/security/cve/CVE-2017-10922/", }, { category: "self", summary: "SUSE CVE CVE-2017-8112 page", url: "https://www.suse.com/security/cve/CVE-2017-8112/", }, { category: "self", summary: "SUSE CVE CVE-2017-8309 page", url: "https://www.suse.com/security/cve/CVE-2017-8309/", }, { category: "self", summary: "SUSE CVE CVE-2017-8905 page", url: "https://www.suse.com/security/cve/CVE-2017-8905/", }, { category: "self", summary: "SUSE CVE CVE-2017-9330 page", url: "https://www.suse.com/security/cve/CVE-2017-9330/", }, { category: "self", summary: "SUSE CVE CVE-2017-9374 page", url: "https://www.suse.com/security/cve/CVE-2017-9374/", }, { category: "self", summary: "SUSE CVE CVE-2017-9503 page", url: "https://www.suse.com/security/cve/CVE-2017-9503/", }, ], title: "Security update for xen", tracking: { current_release_date: "2017-07-06T09:40:48Z", generator: { date: "2017-07-06T09:40:48Z", engine: { name: "cve-database.git:bin/generate-csaf.pl", version: "1", }, }, id: "SUSE-SU-2017:1795-1", initial_release_date: "2017-07-06T09:40:48Z", revision_history: [ { date: "2017-07-06T09:40:48Z", number: "1", summary: "Current version", }, ], status: "final", version: "1", }, }, product_tree: { branches: [ { branches: [ { branches: [ { category: "product_version", name: "xen-4.4.4_21-22.42.1.x86_64", product: { name: "xen-4.4.4_21-22.42.1.x86_64", product_id: "xen-4.4.4_21-22.42.1.x86_64", }, }, { category: "product_version", name: "xen-doc-html-4.4.4_21-22.42.1.x86_64", product: { name: "xen-doc-html-4.4.4_21-22.42.1.x86_64", product_id: "xen-doc-html-4.4.4_21-22.42.1.x86_64", }, }, { category: "product_version", name: "xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", product: { name: "xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", product_id: "xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", }, }, { category: "product_version", name: "xen-libs-4.4.4_21-22.42.1.x86_64", product: { name: "xen-libs-4.4.4_21-22.42.1.x86_64", product_id: "xen-libs-4.4.4_21-22.42.1.x86_64", }, }, { category: "product_version", name: "xen-libs-32bit-4.4.4_21-22.42.1.x86_64", product: { name: "xen-libs-32bit-4.4.4_21-22.42.1.x86_64", product_id: "xen-libs-32bit-4.4.4_21-22.42.1.x86_64", }, }, { category: "product_version", name: "xen-tools-4.4.4_21-22.42.1.x86_64", product: { name: "xen-tools-4.4.4_21-22.42.1.x86_64", product_id: "xen-tools-4.4.4_21-22.42.1.x86_64", }, }, { category: "product_version", name: "xen-tools-domU-4.4.4_21-22.42.1.x86_64", product: { name: "xen-tools-domU-4.4.4_21-22.42.1.x86_64", product_id: "xen-tools-domU-4.4.4_21-22.42.1.x86_64", }, }, ], category: "architecture", name: "x86_64", }, { branches: [ { category: "product_name", name: "SUSE Linux Enterprise Server for SAP Applications 12", product: { name: "SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12", product_identification_helper: { cpe: "cpe:/o:suse:sles_sap:12", }, }, }, { category: "product_name", name: "SUSE Linux Enterprise Server 12-LTSS", product: { name: "SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS", product_identification_helper: { cpe: "cpe:/o:suse:sles-ltss:12", }, }, }, ], category: "product_family", name: "SUSE Linux Enterprise", }, ], category: "vendor", name: "SUSE", }, ], relationships: [ { category: "default_component_of", full_product_name: { name: "xen-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "xen-doc-html-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-doc-html-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", }, product_reference: "xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "xen-libs-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-libs-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "xen-libs-32bit-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-libs-32bit-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "xen-tools-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-tools-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "xen-tools-domU-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12", product_id: "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-tools-domU-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server for SAP Applications 12", }, { category: "default_component_of", full_product_name: { name: "xen-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-doc-html-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-doc-html-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", }, product_reference: "xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-libs-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-libs-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-libs-32bit-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-libs-32bit-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-tools-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-tools-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, { category: "default_component_of", full_product_name: { name: "xen-tools-domU-4.4.4_21-22.42.1.x86_64 as component of SUSE Linux Enterprise Server 12-LTSS", product_id: "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", }, product_reference: "xen-tools-domU-4.4.4_21-22.42.1.x86_64", relates_to_product_reference: "SUSE Linux Enterprise Server 12-LTSS", }, ], }, vulnerabilities: [ { cve: "CVE-2017-10911", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10911", }, ], notes: [ { category: "general", text: "The make_response function in drivers/block/xen-blkback/blkback.c in the Linux kernel before 4.11.8 allows guest OS users to obtain sensitive information from host OS (or other guest OS) kernel memory by leveraging the copying of uninitialized padding fields in Xen block-interface response structures, aka XSA-216.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10911", url: "https://www.suse.com/security/cve/CVE-2017-10911", }, { category: "external", summary: "SUSE Bug 1042863 for CVE-2017-10911", url: "https://bugzilla.suse.com/1042863", }, { category: "external", summary: "SUSE Bug 1043330 for CVE-2017-10911", url: "https://bugzilla.suse.com/1043330", }, { category: "external", summary: "SUSE Bug 1057378 for CVE-2017-10911", url: "https://bugzilla.suse.com/1057378", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 4.3, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "moderate", }, ], title: "CVE-2017-10911", }, { cve: "CVE-2017-10912", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10912", }, ], notes: [ { category: "general", text: "Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10912", url: "https://www.suse.com/security/cve/CVE-2017-10912", }, { category: "external", summary: "SUSE Bug 1042882 for CVE-2017-10912", url: "https://bugzilla.suse.com/1042882", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-10912", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10912", }, { cve: "CVE-2017-10913", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10913", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10913", url: "https://www.suse.com/security/cve/CVE-2017-10913", }, { category: "external", summary: "SUSE Bug 1042893 for CVE-2017-10913", url: "https://bugzilla.suse.com/1042893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10913", }, { cve: "CVE-2017-10914", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10914", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x has a race condition leading to a double free, which allows guest OS users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka XSA-218 bug 2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10914", url: "https://www.suse.com/security/cve/CVE-2017-10914", }, { category: "external", summary: "SUSE Bug 1042893 for CVE-2017-10914", url: "https://bugzilla.suse.com/1042893", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10914", }, { cve: "CVE-2017-10915", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10915", }, ], notes: [ { category: "general", text: "The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10915", url: "https://www.suse.com/security/cve/CVE-2017-10915", }, { category: "external", summary: "SUSE Bug 1042915 for CVE-2017-10915", url: "https://bugzilla.suse.com/1042915", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10915", }, { cve: "CVE-2017-10917", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10917", }, ], notes: [ { category: "general", text: "Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10917", url: "https://www.suse.com/security/cve/CVE-2017-10917", }, { category: "external", summary: "SUSE Bug 1042924 for CVE-2017-10917", url: "https://bugzilla.suse.com/1042924", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.9, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10917", }, { cve: "CVE-2017-10918", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10918", }, ], notes: [ { category: "general", text: "Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10918", url: "https://www.suse.com/security/cve/CVE-2017-10918", }, { category: "external", summary: "SUSE Bug 1042931 for CVE-2017-10918", url: "https://bugzilla.suse.com/1042931", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-10918", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10918", }, { cve: "CVE-2017-10920", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10920", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 1.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10920", url: "https://www.suse.com/security/cve/CVE-2017-10920", }, { category: "external", summary: "SUSE Bug 1042938 for CVE-2017-10920", url: "https://bugzilla.suse.com/1042938", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-10920", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10920", }, { cve: "CVE-2017-10921", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10921", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 2.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10921", url: "https://www.suse.com/security/cve/CVE-2017-10921", }, { category: "external", summary: "SUSE Bug 1042938 for CVE-2017-10921", url: "https://bugzilla.suse.com/1042938", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10921", }, { cve: "CVE-2017-10922", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-10922", }, ], notes: [ { category: "general", text: "The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-10922", url: "https://www.suse.com/security/cve/CVE-2017-10922", }, { category: "external", summary: "SUSE Bug 1042938 for CVE-2017-10922", url: "https://bugzilla.suse.com/1042938", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-10922", }, { cve: "CVE-2017-8112", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8112", }, ], notes: [ { category: "general", text: "hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8112", url: "https://www.suse.com/security/cve/CVE-2017-8112", }, { category: "external", summary: "SUSE Bug 1036211 for CVE-2017-8112", url: "https://bugzilla.suse.com/1036211", }, { category: "external", summary: "SUSE Bug 1036470 for CVE-2017-8112", url: "https://bugzilla.suse.com/1036470", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 6.5, baseSeverity: "MEDIUM", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "low", }, ], title: "CVE-2017-8112", }, { cve: "CVE-2017-8309", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8309", }, ], notes: [ { category: "general", text: "Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8309", url: "https://www.suse.com/security/cve/CVE-2017-8309", }, { category: "external", summary: "SUSE Bug 1037242 for CVE-2017-8309", url: "https://bugzilla.suse.com/1037242", }, { category: "external", summary: "SUSE Bug 1037243 for CVE-2017-8309", url: "https://bugzilla.suse.com/1037243", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-8309", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.5, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "low", }, ], title: "CVE-2017-8309", }, { cve: "CVE-2017-8905", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-8905", }, ], notes: [ { category: "general", text: "Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-8905", url: "https://www.suse.com/security/cve/CVE-2017-8905", }, { category: "external", summary: "SUSE Bug 1034845 for CVE-2017-8905", url: "https://bugzilla.suse.com/1034845", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-8905", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 7.8, baseSeverity: "HIGH", vectorString: "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "important", }, ], title: "CVE-2017-8905", }, { cve: "CVE-2017-9330", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9330", }, ], notes: [ { category: "general", text: "QEMU (aka Quick Emulator) before 2.9.0, when built with the USB OHCI Emulation support, allows local guest OS users to cause a denial of service (infinite loop) by leveraging an incorrect return value, a different vulnerability than CVE-2017-6505.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9330", url: "https://www.suse.com/security/cve/CVE-2017-9330", }, { category: "external", summary: "SUSE Bug 1042159 for CVE-2017-9330", url: "https://bugzilla.suse.com/1042159", }, { category: "external", summary: "SUSE Bug 1042160 for CVE-2017-9330", url: "https://bugzilla.suse.com/1042160", }, { category: "external", summary: "SUSE Bug 1043157 for CVE-2017-9330", url: "https://bugzilla.suse.com/1043157", }, { category: "external", summary: "SUSE Bug 1178658 for CVE-2017-9330", url: "https://bugzilla.suse.com/1178658", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "low", }, ], title: "CVE-2017-9330", }, { cve: "CVE-2017-9374", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9374", }, ], notes: [ { category: "general", text: "Memory leak in QEMU (aka Quick Emulator), when built with USB EHCI Emulation support, allows local guest OS privileged users to cause a denial of service (memory consumption) by repeatedly hot-unplugging the device.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9374", url: "https://www.suse.com/security/cve/CVE-2017-9374", }, { category: "external", summary: "SUSE Bug 1043073 for CVE-2017-9374", url: "https://bugzilla.suse.com/1043073", }, { category: "external", summary: "SUSE Bug 1043074 for CVE-2017-9374", url: "https://bugzilla.suse.com/1043074", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "low", }, ], title: "CVE-2017-9374", }, { cve: "CVE-2017-9503", ids: [ { system_name: "SUSE CVE Page", text: "https://www.suse.com/security/cve/CVE-2017-9503", }, ], notes: [ { category: "general", text: "QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.", title: "CVE description", }, ], product_status: { recommended: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, references: [ { category: "external", summary: "CVE-2017-9503", url: "https://www.suse.com/security/cve/CVE-2017-9503", }, { category: "external", summary: "SUSE Bug 1043296 for CVE-2017-9503", url: "https://bugzilla.suse.com/1043296", }, { category: "external", summary: "SUSE Bug 1043297 for CVE-2017-9503", url: "https://bugzilla.suse.com/1043297", }, { category: "external", summary: "SUSE Bug 1043312 for CVE-2017-9503", url: "https://bugzilla.suse.com/1043312", }, ], remediations: [ { category: "vendor_fix", details: "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", product_ids: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], scores: [ { cvss_v3: { baseScore: 3.8, baseSeverity: "LOW", vectorString: "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", version: "3.0", }, products: [ "SUSE Linux Enterprise Server 12-LTSS:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server 12-LTSS:xen-tools-domU-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-doc-html-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-kmp-default-4.4.4_21_k3.12.61_52.77-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-32bit-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-libs-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-4.4.4_21-22.42.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 12:xen-tools-domU-4.4.4_21-22.42.1.x86_64", ], }, ], threats: [ { category: "impact", date: "2017-07-06T09:40:48Z", details: "low", }, ], title: "CVE-2017-9503", }, ], }
ghsa-r6j9-5wqc-p46g
Vulnerability from github
Published
2022-05-13 01:42
Modified
2022-05-13 01:42
Severity ?
Details
The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.
{ affected: [], aliases: [ "CVE-2017-10913", ], database_specific: { cwe_ids: [], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2017-07-05T01:29:00Z", severity: "CRITICAL", }, details: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", id: "GHSA-r6j9-5wqc-p46g", modified: "2022-05-13T01:42:01Z", published: "2022-05-13T01:42:01Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2017-10913", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201708-03", }, { type: "WEB", url: "https://security.gentoo.org/glsa/201710-17", }, { type: "WEB", url: "https://xenbits.xen.org/xsa/advisory-218.html", }, { type: "WEB", url: "http://www.debian.org/security/2017/dsa-3969", }, { type: "WEB", url: "http://www.securityfocus.com/bid/99411", }, { type: "WEB", url: "http://www.securitytracker.com/id/1038722", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
fkie_cve-2017-10913
Vulnerability from fkie_nvd
Published
2017-07-05 01:29
Modified
2025-04-20 01:37
Severity ?
Summary
The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.
References
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", matchCriteriaId: "7494A471-EEFC-44F4-96B1-FDBA3B780313", versionEndIncluding: "4.8.1", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", }, { lang: "es", value: "La característica de tabla grant en Xen, hasta las versiones 4.8.x, ofrece información de mapeo falsa en ciertos casos de llamadas simultáneas de desasignación, lo que permite que atacantes del backend obtengan información sensible o adquieran privilegios. Esto también se conoce como XSA-218, fallo 1.", }, ], id: "CVE-2017-10913", lastModified: "2025-04-20T01:37:25.860", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-07-05T01:29:00.610", references: [ { source: "cve@mitre.org", url: "http://www.debian.org/security/2017/dsa-3969", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99411", }, { source: "cve@mitre.org", url: "http://www.securitytracker.com/id/1038722", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201708-03", }, { source: "cve@mitre.org", url: "https://security.gentoo.org/glsa/201710-17", }, { source: "cve@mitre.org", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://xenbits.xen.org/xsa/advisory-218.html", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.debian.org/security/2017/dsa-3969", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99411", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "http://www.securitytracker.com/id/1038722", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201708-03", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://security.gentoo.org/glsa/201710-17", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://xenbits.xen.org/xsa/advisory-218.html", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Deferred", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
gsd-2017-10913
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.
Aliases
Aliases
{ GSD: { alias: "CVE-2017-10913", description: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", id: "GSD-2017-10913", references: [ "https://www.suse.com/security/cve/CVE-2017-10913.html", "https://www.debian.org/security/2017/dsa-3969", ], }, gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2017-10913", ], details: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", id: "GSD-2017-10913", modified: "2023-12-13T01:21:14.880563Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-10913", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "1038722", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1038722", }, { name: "GLSA-201708-03", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201708-03", }, { name: "DSA-3969", refsource: "DEBIAN", url: "http://www.debian.org/security/2017/dsa-3969", }, { name: "99411", refsource: "BID", url: "http://www.securityfocus.com/bid/99411", }, { name: "https://xenbits.xen.org/xsa/advisory-218.html", refsource: "CONFIRM", url: "https://xenbits.xen.org/xsa/advisory-218.html", }, { name: "GLSA-201710-17", refsource: "GENTOO", url: "https://security.gentoo.org/glsa/201710-17", }, ], }, }, "nvd.nist.gov": { configurations: { CVE_data_version: "4.0", nodes: [ { children: [], cpe_match: [ { cpe23Uri: "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", cpe_name: [], versionEndIncluding: "4.8.1", vulnerable: true, }, ], operator: "OR", }, ], }, cve: { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2017-10913", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "en", value: "The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], }, ], }, references: { reference_data: [ { name: "https://xenbits.xen.org/xsa/advisory-218.html", refsource: "CONFIRM", tags: [ "Mailing List", "Vendor Advisory", ], url: "https://xenbits.xen.org/xsa/advisory-218.html", }, { name: "99411", refsource: "BID", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/99411", }, { name: "1038722", refsource: "SECTRACK", tags: [], url: "http://www.securitytracker.com/id/1038722", }, { name: "GLSA-201708-03", refsource: "GENTOO", tags: [], url: "https://security.gentoo.org/glsa/201708-03", }, { name: "GLSA-201710-17", refsource: "GENTOO", tags: [], url: "https://security.gentoo.org/glsa/201710-17", }, { name: "DSA-3969", refsource: "DEBIAN", tags: [], url: "http://www.debian.org/security/2017/dsa-3969", }, ], }, }, impact: { baseMetricV2: { cvssV2: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 7.5, confidentialityImpact: "PARTIAL", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:L/Au:N/C:P/I:P/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 6.4, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, severity: "HIGH", userInteractionRequired: false, }, baseMetricV3: { cvssV3: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.8, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 5.9, }, }, lastModifiedDate: "2019-10-03T00:03Z", publishedDate: "2017-07-05T01:29Z", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.