VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server 11 SP2-LTSS

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSS

Vulnerabilities (72)

  • CVE-2015-8550HigApr 14, 2016
    affected < 4.1.6_08-26.1fixed 4.1.6_08-26.1

    Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.

  • CVE-2016-3159LowApr 13, 2016
    affected < 4.1.6_08-29.1fixed 4.1.6_08-29.1

    The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exceptio

  • CVE-2016-3158LowApr 13, 2016
    affected < 4.1.6_08-29.1fixed 4.1.6_08-29.1

    The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception a

  • CVE-2015-8555HigApr 13, 2016
    affected < 4.1.6_08-26.1fixed 4.1.6_08-26.1

    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.

  • CVE-2016-1714HigApr 7, 2016
    affected < 4.1.6_08-26.1fixed 4.1.6_08-26.1

    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access

  • CVE-2016-2271MedFeb 19, 2016
    affected < 4.1.6_08-26.1fixed 4.1.6_08-26.1

    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.

  • CVE-2016-2270MedFeb 19, 2016
    affected < 4.1.6_08-26.1fixed 4.1.6_08-26.1

    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.

  • CVE-2016-1571MedJan 22, 2016
    affected < 4.1.6_08-26.1fixed 4.1.6_08-26.1

    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction

  • CVE-2016-1570HigJan 22, 2016
    affected < 4.1.6_08-26.1fixed 4.1.6_08-26.1

    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_

  • CVE-2015-7512CriJan 8, 2016
    affected < 4.1.6_08-26.1fixed 4.1.6_08-26.1

    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.

  • CVE-2015-8340Dec 17, 2015
    affected < 4.1.6_08-23.1fixed 4.1.6_08-23.1

    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.

  • CVE-2015-8339Dec 17, 2015
    affected < 4.1.6_08-23.1fixed 4.1.6_08-23.1

    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.

  • CVE-2015-8104CriNov 16, 2015
    affected < 4.1.6_08-23.1fixed 4.1.6_08-23.1

    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.

  • CVE-2015-5307Nov 16, 2015
    affected < 4.1.6_08-23.1fixed 4.1.6_08-23.1

    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

  • CVE-2015-7972Oct 30, 2015
    affected < 4.1.6_08-23.1fixed 4.1.6_08-23.1

    The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users t

  • CVE-2015-7971Oct 30, 2015
    affected < 4.1.6_08-20.1fixed 4.1.6_08-20.1

    Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in

  • CVE-2015-7970Oct 30, 2015
    affected < 4.1.6_08-23.1fixed 4.1.6_08-23.1

    The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-co

  • CVE-2015-7969Oct 30, 2015
    affected < 4.1.6_08-20.1fixed 4.1.6_08-20.1

    Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcp

  • CVE-2015-7835Oct 30, 2015
    affected < 4.1.6_08-20.1fixed 4.1.6_08-20.1

    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

  • CVE-2015-4037Aug 26, 2015
    affected < 4.1.6_08-20.1fixed 4.1.6_08-20.1

    The slirp_smb function in net/slirp.c in QEMU 2.3.0 and earlier creates temporary files with predictable names, which allows local users to cause a denial of service (instantiation failure) by creating /tmp/qemu-smb.*-* files before the program.