rpm package
suse/xen&distro=SUSE Linux Enterprise Software Development Kit 11 SP4
pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4
Vulnerabilities (201)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-17563 | Hig | 7.8 | < 4.4.4_28-61.23.2 | 4.4.4_28-61.23.2 | Dec 12, 2017 | An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode. | |
| CVE-2017-15597 | Cri | 9.1 | < 4.4.4_26-61.17.1 | 4.4.4_26-61.17.1 | Oct 30, 2017 | An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a g | |
| CVE-2015-7549 | Med | 6.0 | < 4.4.4_02-32.1 | 4.4.4_02-32.1 | Oct 30, 2017 | The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method. | |
| CVE-2017-15595 | Hig | 8.8 | < 4.4.4_24-61.12.1 | 4.4.4_24-61.12.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking. | |
| CVE-2017-15594 | Hig | 8.8 | < 4.4.4_24-61.12.1 | 4.4.4_24-61.12.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging. | |
| CVE-2017-15593 | Med | 6.5 | < 4.4.4_24-61.12.1 | 4.4.4_24-61.12.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (memory leak) because reference counts are mishandled. | |
| CVE-2017-15592 | Hig | 8.8 | < 4.4.4_24-61.12.1 | 4.4.4_24-61.12.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests. | |
| CVE-2017-15590 | Hig | 8.8 | < 4.4.4_24-61.12.1 | 4.4.4_24-61.12.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled. | |
| CVE-2017-15589 | Med | 6.5 | < 4.4.4_24-61.12.1 | 4.4.4_24-61.12.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory. | |
| CVE-2017-15588 | Hig | 7.8 | < 4.4.4_24-61.12.1 | 4.4.4_24-61.12.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry. | |
| CVE-2015-7504 | Hig | 8.8 | < 4.4.3_06-29.1 | 4.4.3_06-29.1 | Oct 16, 2017 | Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode. | |
| CVE-2017-15289 | Med | 6.0 | < 4.4.4_26-61.17.1 | 4.4.4_26-61.17.1 | Oct 16, 2017 | The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation. | |
| CVE-2017-14319 | Hig | 8.8 | < 4.4.4_22-61.9.2 | 4.4.4_22-61.9.2 | Sep 12, 2017 | A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neit | |
| CVE-2017-14317 | Med | 5.6 | < 4.4.4_22-61.9.2 | 4.4.4_22-61.9.2 | Sep 12, 2017 | A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on | |
| CVE-2017-14316 | Hig | 8.8 | < 4.4.4_22-61.9.2 | 4.4.4_22-61.9.2 | Sep 12, 2017 | A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the | |
| CVE-2017-13672 | Med | 5.5 | < 4.4.4_26-61.17.1 | 4.4.4_26-61.17.1 | Sep 1, 2017 | QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update. | |
| CVE-2017-12137 | Hig | 8.8 | < 4.4.4_22-61.9.2 | 4.4.4_22-61.9.2 | Aug 24, 2017 | arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref. | |
| CVE-2017-12135 | Hig | 8.8 | < 4.4.4_22-61.9.2 | 4.4.4_22-61.9.2 | Aug 24, 2017 | Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants. | |
| CVE-2017-12855 | Med | 6.5 | < 4.4.4_22-61.9.2 | 4.4.4_22-61.9.2 | Aug 15, 2017 | Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances | |
| CVE-2017-11334 | Med | 4.4 | < 4.4.4_22-61.9.2 | 4.4.4_22-61.9.2 | Aug 2, 2017 | The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area. |
- affected < 4.4.4_28-61.23.2fixed 4.4.4_28-61.23.2
An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging an incorrect mask for reference-count overflow checking in shadow mode.
- affected < 4.4.4_26-61.17.1fixed 4.4.4_26-61.17.1
An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a g
- affected < 4.4.4_02-32.1fixed 4.4.4_02-32.1
The MSI-X MMIO support in hw/pci/msix.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by leveraging failure to define the .write method.
- affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1
An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.
- affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1
An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.
- affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1
An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (memory leak) because reference counts are mishandled.
- affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1
An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because self-linear shadow mappings are mishandled for translated guests.
- affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1
An issue was discovered in Xen through 4.9.x allowing x86 guest OS users to cause a denial of service (hypervisor crash) or possibly gain privileges because MSI mapping was mishandled.
- affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1
An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
- affected < 4.4.4_24-61.12.1fixed 4.4.4_24-61.12.1
An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry.
- affected < 4.4.3_06-29.1fixed 4.4.3_06-29.1
Heap-based buffer overflow in the pcnet_receive function in hw/net/pcnet.c in QEMU allows guest OS administrators to cause a denial of service (instance crash) or possibly execute arbitrary code via a series of packets in loopback mode.
- affected < 4.4.4_26-61.17.1fixed 4.4.4_26-61.17.1
The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
- affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2
A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neit
- affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2
A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on
- affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2
A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the
- affected < 4.4.4_26-61.17.1fixed 4.4.4_26-61.17.1
QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
- affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2
arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
- affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2
Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.
- affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2
Xen maintains the _GTF_{read,writ}ing bits as appropriate, to inform the guest that a grant is in use. A guest is expected not to modify the grant details while it is in use, whereas the guest is free to modify/reuse the grant entry when it is not in use. Under some circumstances
- affected < 4.4.4_22-61.9.2fixed 4.4.4_22-61.9.2
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
Page 3 of 11