DescriptionAn issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.
Overall state of this security issue: Resolved
This issue is currently rated as having important severity.
- SUSE-SU-2018:2677-1, published Mon Sep 10 13:07:58 MDT 2018
- SUSE-SU-2018:2678-1, published Mon Sep 10 13:08:28 MDT 2018
- SUSE-SU-2018:2933-1, published Fri Sep 28 07:08:14 MDT 2018
- SUSE-SU-2018:2935-1, published Fri Sep 28 10:08:01 MDT 2018
List of released packages
|Product(s)||Fixed package version(s)||References|
|SUSE Linux Enterprise Module for Live Patching 15|| ||Patchnames:
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification.
|SUSE Linux Enterprise Desktop 12 SP3||kernel-source||Analysis|
|SUSE Linux Enterprise Module for Basesystem 15 GA||kernel-source||Released|
|SUSE Linux Enterprise Module for Development Tools 15 GA||kernel-source||Released|
|SUSE Linux Enterprise Server 11 SP4||kernel-source||Analysis|
|SUSE Linux Enterprise Server 12 SP3||kernel-source||Analysis|