VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Software Development Kit 11 SP4

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4

Vulnerabilities (201)

  • CVE-2017-17563HigDec 12, 2017
    affected < 4.4.4_28-61.23.2fixed 4.4.4_28-61.23.2

    An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.

  • CVE-2017-15597CriOct 30, 2017
    affected < 4.4.4_26-61.17.1fixed 4.4.4_26-61.17.1

    An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a g

  • CVE-2015-7549MedOct 30, 2017
    affected < 4.4.4_02-32.1fixed 4.4.4_02-32.1

    The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.

  • CVE-2017-15595HigOct 18, 2017
    affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1

    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.

  • CVE-2017-15594HigOct 18, 2017
    affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1

    An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.

  • CVE-2017-15593MedOct 18, 2017
    affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1

    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (memory leak) because reference counts are mishandled.

  • CVE-2017-15592HigOct 18, 2017
    affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1

    An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.

  • CVE-2017-15590HigOct 18, 2017
    affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1

    An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled.

  • CVE-2017-15589MedOct 18, 2017
    affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1

    An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.

  • CVE-2017-15588HigOct 18, 2017
    affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1

    An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry.

  • CVE-2015-7504HigOct 16, 2017
    affected < 4.4.3_06-29.1fixed 4.4.3_06-29.1

    Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.

  • CVE-2017-15289MedOct 16, 2017
    affected < 4.4.4_26-61.17.1fixed 4.4.4_26-61.17.1

    The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.

  • CVE-2017-14319HigSep 12, 2017
    affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2

    A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neit

  • CVE-2017-14317MedSep 12, 2017
    affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2

    A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on

  • CVE-2017-14316HigSep 12, 2017
    affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2

    A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the

  • CVE-2017-13672MedSep 1, 2017
    affected < 4.4.4_26-61.17.1fixed 4.4.4_26-61.17.1

    QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.

  • CVE-2017-12137HigAug 24, 2017
    affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2

    arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.

  • CVE-2017-12135HigAug 24, 2017
    affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2

    Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.

  • CVE-2017-12855MedAug 15, 2017
    affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2

    Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances

  • CVE-2017-11334MedAug 2, 2017
    affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2

    The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.

Page 3 of 11