VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server 12 SP5

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5

Vulnerabilities (140)

  • CVE-2020-25595Sep 23, 2020
    affected < 4.12.3_08-3.24.1fixed 4.12.3_08-3.24.1

    An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specific

  • CVE-2020-14364Aug 31, 2020
    affected < 4.12.3_08-3.24.1fixed 4.12.3_08-3.24.1

    An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw all

  • CVE-2020-15567Jul 7, 2020
    affected < 4.12.3_04-3.18.1fixed 4.12.3_04-3.18.1

    An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-at

  • CVE-2020-15565Jul 7, 2020
    affected < 4.12.3_04-3.18.1fixed 4.12.3_04-3.18.1

    An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require fl

  • CVE-2020-15563Jul 7, 2020
    affected < 4.12.3_04-3.18.1fixed 4.12.3_04-3.18.1

    An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A mali

  • CVE-2020-15566Jul 7, 2020
    affected < 4.12.3_04-3.18.1fixed 4.12.3_04-3.18.1

    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory

  • CVE-2020-0543Jun 15, 2020
    affected < 4.12.3_02-3.14.1fixed 4.12.3_02-3.14.1

    Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

  • CVE-2020-11743Apr 14, 2020
    affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1

    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one

  • CVE-2020-11742Apr 14, 2020
    affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1

    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 int

  • CVE-2020-11741Apr 14, 2020
    affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1

    An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the admini

  • CVE-2020-11740Apr 14, 2020
    affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1

    An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. Thes

  • CVE-2020-11739Apr 14, 2020
    affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1

    An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processo

  • CVE-2020-8608Feb 6, 2020
    affected < 4.12.4_06-3.36.1fixed 4.12.4_06-3.36.1

    In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.

  • CVE-2020-7211Jan 21, 2020
    affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1

    tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\ directory traversal on Windows.

  • CVE-2019-19577Dec 11, 2019
    affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1

    An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically

  • CVE-2019-19578Dec 11, 2019
    affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1

    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at i

  • CVE-2019-19580Dec 11, 2019
    affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1

    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in rest

  • CVE-2019-19581Dec 11, 2019
    affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1

    An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over

  • CVE-2019-19582Dec 11, 2019
    affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1

    An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits invol

  • CVE-2019-19583Dec 11, 2019
    affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1

    An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the nee

Page 7 of 7