suse-su-2019:14201-1
Vulnerability from csaf_suse
Published
2019-10-25 12:28
Modified
2019-10-25 12:28
Summary
Security update for xen

Notes

Title of the patch
Security update for xen
Description of the patch
This update for xen fixes the following issues: - CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator which could have led to Denial of Service (bsc#1149813). - CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of service (bsc#1146874). - CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU emulator which could have led to execution of arbitrary code with privileges of the QEMU process (bsc#1143797). - CVE-2019-12067: Fixed a null pointer dereference which could have led to denial of service (bsc#1145652). - CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card emulator of QEMU which could have led to denial of service (bsc#1135905). - CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680). - CVE-2017-10806: Fixed a stack buffer overflow in debug logging (bsc#1047675).
Patchnames
sleposp3-xen-14201
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for xen",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for xen fixes the following issues:\n\n- CVE-2019-15890: Fixed a use-after-free in SLiRP networking implementation of QEMU emulator\n  which could have led to Denial of Service (bsc#1149813).\n- CVE-2019-12068: Fixed an issue in lsi which could lead to an infinite loop and denial of \n  service (bsc#1146874).\n- CVE-2019-14378: Fixed a heap buffer overflow in SLiRp networking implementation of QEMU \n  emulator which could have led to execution of  arbitrary code with privileges of the \n  QEMU process (bsc#1143797).\n- CVE-2019-12067: Fixed a null pointer dereference which could have led to denial of service (bsc#1145652).\n- CVE-2019-12155: Fixed a null pointer dereference in QXL VGA card emulator of QEMU which\n  could have led to denial of service (bsc#1135905).\n- CVE-2018-20815: Fixed a heap buffer overflow while loading device tree blob (bsc#1130680).\n- CVE-2017-10806: Fixed a stack buffer overflow in debug logging (bsc#1047675).\n  ",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "sleposp3-xen-14201",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_14201-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2019:14201-1",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-201914201-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2019:14201-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-October/006057.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1047675",
        "url": "https://bugzilla.suse.com/1047675"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126140",
        "url": "https://bugzilla.suse.com/1126140"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126141",
        "url": "https://bugzilla.suse.com/1126141"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126192",
        "url": "https://bugzilla.suse.com/1126192"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126195",
        "url": "https://bugzilla.suse.com/1126195"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126196",
        "url": "https://bugzilla.suse.com/1126196"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1130680",
        "url": "https://bugzilla.suse.com/1130680"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1135905",
        "url": "https://bugzilla.suse.com/1135905"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1143797",
        "url": "https://bugzilla.suse.com/1143797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1145652",
        "url": "https://bugzilla.suse.com/1145652"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1146874",
        "url": "https://bugzilla.suse.com/1146874"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1149813",
        "url": "https://bugzilla.suse.com/1149813"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-10806 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-10806/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2018-20815 page",
        "url": "https://www.suse.com/security/cve/CVE-2018-20815/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-12067 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-12067/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-12068 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-12068/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-12155 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-12155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-14378 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-14378/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-15890 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-15890/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17340 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17340/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17341 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17341/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17342 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17342/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17343 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17343/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-17344 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-17344/"
      }
    ],
    "title": "Security update for xen",
    "tracking": {
      "current_release_date": "2019-10-25T12:28:21Z",
      "generator": {
        "date": "2019-10-25T12:28:21Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2019:14201-1",
      "initial_release_date": "2019-10-25T12:28:21Z",
      "revision_history": [
        {
          "date": "2019-10-25T12:28:21Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
                "product": {
                  "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
                  "product_id": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
                "product": {
                  "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
                  "product_id": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xen-libs-4.2.5_21-45.33.1.i586",
                "product": {
                  "name": "xen-libs-4.2.5_21-45.33.1.i586",
                  "product_id": "xen-libs-4.2.5_21-45.33.1.i586"
                }
              },
              {
                "category": "product_version",
                "name": "xen-tools-domU-4.2.5_21-45.33.1.i586",
                "product": {
                  "name": "xen-tools-domU-4.2.5_21-45.33.1.i586",
                  "product_id": "xen-tools-domU-4.2.5_21-45.33.1.i586"
                }
              }
            ],
            "category": "architecture",
            "name": "i586"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Point of Sale 11 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Point of Sale 11 SP3",
                  "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-pos:11:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
          "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586"
        },
        "product_reference": "xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
          "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586"
        },
        "product_reference": "xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xen-libs-4.2.5_21-45.33.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
          "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586"
        },
        "product_reference": "xen-libs-4.2.5_21-45.33.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "xen-tools-domU-4.2.5_21-45.33.1.i586 as component of SUSE Linux Enterprise Point of Sale 11 SP3",
          "product_id": "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        },
        "product_reference": "xen-tools-domU-4.2.5_21-45.33.1.i586",
        "relates_to_product_reference": "SUSE Linux Enterprise Point of Sale 11 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-10806",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-10806"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-10806",
          "url": "https://www.suse.com/security/cve/CVE-2017-10806"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1047674 for CVE-2017-10806",
          "url": "https://bugzilla.suse.com/1047674"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1047675 for CVE-2017-10806",
          "url": "https://bugzilla.suse.com/1047675"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2017-10806"
    },
    {
      "cve": "CVE-2018-20815",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2018-20815"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2018-20815",
          "url": "https://www.suse.com/security/cve/CVE-2018-20815"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1118900 for CVE-2018-20815",
          "url": "https://bugzilla.suse.com/1118900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1130675 for CVE-2018-20815",
          "url": "https://bugzilla.suse.com/1130675"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1130680 for CVE-2018-20815",
          "url": "https://bugzilla.suse.com/1130680"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1138043 for CVE-2018-20815",
          "url": "https://bugzilla.suse.com/1138043"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2018-20815",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2018-20815"
    },
    {
      "cve": "CVE-2019-12067",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-12067"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The ahci_commit_buf function in ide/ahci.c in QEMU allows attackers to cause a denial of service (NULL dereference) when the command header \u0027ad-\u003ecur_cmd\u0027 is null.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-12067",
          "url": "https://www.suse.com/security/cve/CVE-2019-12067"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1145642 for CVE-2019-12067",
          "url": "https://bugzilla.suse.com/1145642"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1145652 for CVE-2019-12067",
          "url": "https://bugzilla.suse.com/1145652"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-12067"
    },
    {
      "cve": "CVE-2019-12068",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-12068"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances \u0027s-\u003edsp\u0027 index to read next opcode. This can lead to an infinite loop if the next opcode is empty. Move the existing loop exit after 10k iterations so that it covers no-op opcodes as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-12068",
          "url": "https://www.suse.com/security/cve/CVE-2019-12068"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146873 for CVE-2019-12068",
          "url": "https://bugzilla.suse.com/1146873"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1146874 for CVE-2019-12068",
          "url": "https://bugzilla.suse.com/1146874"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-12068",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-12068"
    },
    {
      "cve": "CVE-2019-12155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-12155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-12155",
          "url": "https://www.suse.com/security/cve/CVE-2019-12155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135902 for CVE-2019-12155",
          "url": "https://bugzilla.suse.com/1135902"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1135905 for CVE-2019-12155",
          "url": "https://bugzilla.suse.com/1135905"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.8,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "low"
        }
      ],
      "title": "CVE-2019-12155"
    },
    {
      "cve": "CVE-2019-14378",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-14378"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-14378",
          "url": "https://www.suse.com/security/cve/CVE-2019-14378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1143794 for CVE-2019-14378",
          "url": "https://bugzilla.suse.com/1143794"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1143797 for CVE-2019-14378",
          "url": "https://bugzilla.suse.com/1143797"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-14378",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-14378"
    },
    {
      "cve": "CVE-2019-15890",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-15890"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-15890",
          "url": "https://www.suse.com/security/cve/CVE-2019-15890"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149811 for CVE-2019-15890",
          "url": "https://bugzilla.suse.com/1149811"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1149813 for CVE-2019-15890",
          "url": "https://bugzilla.suse.com/1149813"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-15890",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-15890"
    },
    {
      "cve": "CVE-2019-17340",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17340"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17340",
          "url": "https://www.suse.com/security/cve/CVE-2019-17340"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126140 for CVE-2019-17340",
          "url": "https://bugzilla.suse.com/1126140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-17340",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-17340"
    },
    {
      "cve": "CVE-2019-17341",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17341"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17341",
          "url": "https://www.suse.com/security/cve/CVE-2019-17341"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126141 for CVE-2019-17341",
          "url": "https://bugzilla.suse.com/1126141"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-17341",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-17341"
    },
    {
      "cve": "CVE-2019-17342",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17342"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17342",
          "url": "https://www.suse.com/security/cve/CVE-2019-17342"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126192 for CVE-2019-17342",
          "url": "https://bugzilla.suse.com/1126192"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-17342",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-17342"
    },
    {
      "cve": "CVE-2019-17343",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17343"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17343",
          "url": "https://www.suse.com/security/cve/CVE-2019-17343"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126195 for CVE-2019-17343",
          "url": "https://bugzilla.suse.com/1126195"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-17343",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "important"
        }
      ],
      "title": "CVE-2019-17343"
    },
    {
      "cve": "CVE-2019-17344",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-17344"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
          "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-17344",
          "url": "https://www.suse.com/security/cve/CVE-2019-17344"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1126196 for CVE-2019-17344",
          "url": "https://bugzilla.suse.com/1126196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2019-17344",
          "url": "https://bugzilla.suse.com/1178658"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-default-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-kmp-pae-4.2.5_21_3.0.101_0.47.106.59-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-libs-4.2.5_21-45.33.1.i586",
            "SUSE Linux Enterprise Point of Sale 11 SP3:xen-tools-domU-4.2.5_21-45.33.1.i586"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-10-25T12:28:21Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-17344"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…