rpm package
suse/xen&distro=SUSE Linux Enterprise Server for SAP Applications 12 SP5
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5
Vulnerabilities (140)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-25595 | — | < 4.12.3_08-3.24.1 | 4.12.3_08-3.24.1 | Sep 23, 2020 | An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specific | ||
| CVE-2020-14364 | — | < 4.12.3_08-3.24.1 | 4.12.3_08-3.24.1 | Aug 31, 2020 | An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw all | ||
| CVE-2020-15567 | — | < 4.12.3_04-3.18.1 | 4.12.3_04-3.18.1 | Jul 7, 2020 | An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-at | ||
| CVE-2020-15565 | — | < 4.12.3_04-3.18.1 | 4.12.3_04-3.18.1 | Jul 7, 2020 | An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require fl | ||
| CVE-2020-15563 | — | < 4.12.3_04-3.18.1 | 4.12.3_04-3.18.1 | Jul 7, 2020 | An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A mali | ||
| CVE-2020-15566 | — | < 4.12.3_04-3.18.1 | 4.12.3_04-3.18.1 | Jul 7, 2020 | An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory | ||
| CVE-2020-0543 | — | < 4.12.3_02-3.14.1 | 4.12.3_02-3.14.1 | Jun 15, 2020 | Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2020-11743 | — | < 4.12.2_04-3.11.1 | 4.12.2_04-3.11.1 | Apr 14, 2020 | An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one | ||
| CVE-2020-11742 | — | < 4.12.2_04-3.11.1 | 4.12.2_04-3.11.1 | Apr 14, 2020 | An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 int | ||
| CVE-2020-11741 | — | < 4.12.2_04-3.11.1 | 4.12.2_04-3.11.1 | Apr 14, 2020 | An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the admini | ||
| CVE-2020-11740 | — | < 4.12.2_04-3.11.1 | 4.12.2_04-3.11.1 | Apr 14, 2020 | An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. Thes | ||
| CVE-2020-11739 | — | < 4.12.2_04-3.11.1 | 4.12.2_04-3.11.1 | Apr 14, 2020 | An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processo | ||
| CVE-2020-8608 | — | < 4.12.4_06-3.36.1 | 4.12.4_06-3.36.1 | Feb 6, 2020 | In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code. | ||
| CVE-2020-7211 | — | < 4.12.2_04-3.11.1 | 4.12.2_04-3.11.1 | Jan 21, 2020 | tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\ directory traversal on Windows. | ||
| CVE-2019-19577 | — | < 4.12.1_10-3.8.1 | 4.12.1_10-3.8.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically | ||
| CVE-2019-19578 | — | < 4.12.1_10-3.8.1 | 4.12.1_10-3.8.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at i | ||
| CVE-2019-19580 | — | < 4.12.1_10-3.8.1 | 4.12.1_10-3.8.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in rest | ||
| CVE-2019-19581 | — | < 4.12.1_10-3.8.1 | 4.12.1_10-3.8.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over | ||
| CVE-2019-19582 | — | < 4.12.1_10-3.8.1 | 4.12.1_10-3.8.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits invol | ||
| CVE-2019-19583 | — | < 4.12.1_10-3.8.1 | 4.12.1_10-3.8.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the nee |
- CVE-2020-25595Sep 23, 2020affected < 4.12.3_08-3.24.1fixed 4.12.3_08-3.24.1
An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specific
- CVE-2020-14364Aug 31, 2020affected < 4.12.3_08-3.24.1fixed 4.12.3_08-3.24.1
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw all
- CVE-2020-15567Jul 7, 2020affected < 4.12.3_04-3.18.1fixed 4.12.3_04-3.18.1
An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-at
- CVE-2020-15565Jul 7, 2020affected < 4.12.3_04-3.18.1fixed 4.12.3_04-3.18.1
An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require fl
- CVE-2020-15563Jul 7, 2020affected < 4.12.3_04-3.18.1fixed 4.12.3_04-3.18.1
An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to point at unmapped space. A mali
- CVE-2020-15566Jul 7, 2020affected < 4.12.3_04-3.18.1fixed 4.12.3_04-3.18.1
An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is already in use, (2) the memory
- CVE-2020-0543Jun 15, 2020affected < 4.12.3_02-3.14.1fixed 4.12.3_02-3.14.1
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2020-11743Apr 14, 2020affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1
An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some misplaced brackets cause one
- CVE-2020-11742Apr 14, 2020affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1
An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 int
- CVE-2020-11741Apr 14, 2020affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1
An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the admini
- CVE-2020-11740Apr 14, 2020affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1
An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. Thes
- CVE-2020-11739Apr 14, 2020affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1
An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processo
- CVE-2020-8608Feb 6, 2020affected < 4.12.4_06-3.36.1fixed 4.12.4_06-3.36.1
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
- CVE-2020-7211Jan 21, 2020affected < 4.12.2_04-3.11.1fixed 4.12.2_04-3.11.1
tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\ directory traversal on Windows.
- CVE-2019-19577Dec 11, 2019affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1
An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically
- CVE-2019-19578Dec 11, 2019affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1
An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at i
- CVE-2019-19580Dec 11, 2019affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1
An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in rest
- CVE-2019-19581Dec 11, 2019affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1
An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over
- CVE-2019-19582Dec 11, 2019affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1
An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits invol
- CVE-2019-19583Dec 11, 2019affected < 4.12.1_10-3.8.1fixed 4.12.1_10-3.8.1
An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the nee
Page 7 of 7