VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server 12 SP1

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1

Vulnerabilities (132)

  • CVE-2016-3159LowApr 13, 2016
    affected < 4.5.3_08-17.1fixed 4.5.3_08-17.1

    The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exceptio

  • CVE-2016-3158LowApr 13, 2016
    affected < 4.5.3_08-17.1fixed 4.5.3_08-17.1

    The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception a

  • CVE-2015-8555HigApr 13, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.

  • CVE-2016-1568HigApr 12, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    Use-after-free vulnerability in hw/ide/ahci.c in QEMU, when built with IDE AHCI Emulation support, allows guest OS users to cause a denial of service (instance crash) or possibly execute arbitrary code via an invalid AHCI Native Command Queuing (NCQ) AIO command.

  • CVE-2016-1714HigApr 7, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    The (1) fw_cfg_write and (2) fw_cfg_read functions in hw/nvram/fw_cfg.c in QEMU before 2.4, when built with the Firmware Configuration device emulation support, allow guest OS users with the CAP_SYS_RAWIO privilege to cause a denial of service (out-of-bounds read or write access

  • CVE-2016-2271MedFeb 19, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.

  • CVE-2016-2270MedFeb 19, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.

  • CVE-2016-1571MedJan 22, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction

  • CVE-2016-1570HigJan 22, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_

  • CVE-2015-1779HigJan 12, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.

  • CVE-2015-7512CriJan 8, 2016
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    Buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU, when a guest NIC has a larger MTU, allows remote attackers to cause a denial of service (guest OS crash) or execute arbitrary code via a large packet.

  • CVE-2015-8341Dec 17, 2015
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by startin

  • CVE-2015-8340Dec 17, 2015
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.

  • CVE-2015-8339Dec 17, 2015
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.

  • CVE-2015-8104CriNov 16, 2015
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.

  • CVE-2015-5307Nov 16, 2015
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.

  • CVE-2015-6855HigNov 6, 2015
    affected < 4.5.2_06-7.1fixed 4.5.2_06-7.1

    hw/ide/core.c in QEMU does not properly restrict the commands accepted by an ATAPI device, which allows guest users to cause a denial of service or possibly have unspecified other impact via certain IDE commands, as demonstrated by a WIN_READ_NATIVE_MAX command to an empty drive,

  • CVE-2015-7835Oct 30, 2015
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

  • CVE-2015-7311Oct 1, 2015
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.

  • CVE-2015-5154Aug 12, 2015
    affected < 4.5.2_02-4.1fixed 4.5.2_02-4.1

    Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.

Page 6 of 7