rpm package
suse/xen&distro=SUSE OpenStack Cloud 6
pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%206
Vulnerabilities (52)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-15589 | Med | 6.5 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory. | |
| CVE-2017-15588 | Hig | 7.8 | < 4.5.5_18-22.31.1 | 4.5.5_18-22.31.1 | Oct 18, 2017 | An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry. | |
| CVE-2017-15289 | Med | 6.0 | < 4.5.5_20-22.36.3 | 4.5.5_20-22.36.3 | Oct 16, 2017 | The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation. | |
| CVE-2017-14319 | Hig | 8.8 | < 4.5.5_16-22.28.1 | 4.5.5_16-22.28.1 | Sep 12, 2017 | A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neit | |
| CVE-2017-14318 | Med | 6.5 | < 4.5.5_16-22.28.1 | 4.5.5_16-22.28.1 | Sep 12, 2017 | An issue was discovered in Xen 4.5.x through 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table is checked | |
| CVE-2017-14317 | Med | 5.6 | < 4.5.5_16-22.28.1 | 4.5.5_16-22.28.1 | Sep 12, 2017 | A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on | |
| CVE-2017-14316 | Hig | 8.8 | < 4.5.5_16-22.28.1 | 4.5.5_16-22.28.1 | Sep 12, 2017 | A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the | |
| CVE-2017-13672 | Med | 5.5 | < 4.5.5_20-22.36.3 | 4.5.5_20-22.36.3 | Sep 1, 2017 | QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update. | |
| CVE-2017-12137 | Hig | 8.8 | < 4.5.5_14-22.25.1 | 4.5.5_14-22.25.1 | Aug 24, 2017 | arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref. | |
| CVE-2017-12135 | Hig | 8.8 | < 4.5.5_14-22.25.1 | 4.5.5_14-22.25.1 | Aug 24, 2017 | Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants. | |
| CVE-2017-11334 | Med | 4.4 | < 4.5.5_14-22.25.1 | 4.5.5_14-22.25.1 | Aug 2, 2017 | The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area. | |
| CVE-2017-10806 | Med | 5.5 | < 4.5.5_14-22.25.1 | 4.5.5_14-22.25.1 | Aug 2, 2017 | Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages. | |
| CVE-2017-10664 | Hig | 7.5 | < 4.5.5_14-22.25.1 | 4.5.5_14-22.25.1 | Aug 2, 2017 | qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt. | |
| CVE-2017-11434 | Med | 5.5 | < 4.5.5_14-22.25.1 | 4.5.5_14-22.25.1 | Jul 25, 2017 | The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string. | |
| CVE-2017-10922 | Hig | 7.5 | < 4.5.5_12-22.18.1 | 4.5.5_12-22.18.1 | Jul 5, 2017 | The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3. | |
| CVE-2017-10921 | Cri | 10.0 | < 4.5.5_12-22.18.1 | 4.5.5_12-22.18.1 | Jul 5, 2017 | The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka X | |
| CVE-2017-10920 | Cri | 10.0 | < 4.5.5_12-22.18.1 | 4.5.5_12-22.18.1 | Jul 5, 2017 | The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged ho | |
| CVE-2017-10918 | Cri | 10.0 | < 4.5.5_12-22.18.1 | 4.5.5_12-22.18.1 | Jul 5, 2017 | Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222. | |
| CVE-2017-10917 | Cri | 9.1 | < 4.5.5_12-22.18.1 | 4.5.5_12-22.18.1 | Jul 5, 2017 | Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221. | |
| CVE-2017-10916 | Hig | 7.5 | < 4.5.5_12-22.18.1 | 4.5.5_12-22.18.1 | Jul 5, 2017 | The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220. |
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 HVM guest OS users to obtain sensitive information from the host OS (or an arbitrary guest OS) because intercepted I/O operations can cause a write of data from uninitialized hypervisor stack memory.
- affected < 4.5.5_18-22.31.1fixed 4.5.5_18-22.31.1
An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to execute arbitrary code on the host OS because of a race condition that can cause a stale TLB entry.
- affected < 4.5.5_20-22.36.3fixed 4.5.5_20-22.36.3
The mode4and5 write functions in hw/display/cirrus_vga.c in Qemu allow local OS guest privileged users to cause a denial of service (out-of-bounds write access and Qemu process crash) via vectors related to dst calculation.
- affected < 4.5.5_16-22.28.1fixed 4.5.5_16-22.28.1
A grant unmapping issue was discovered in Xen through 4.9.x. When removing or replacing a grant mapping, the x86 PV specific path needs to make sure page table entries remain in sync with other accounting done. Although the identity of the page frame was validated correctly, neit
- affected < 4.5.5_16-22.28.1fixed 4.5.5_16-22.28.1
An issue was discovered in Xen 4.5.x through 4.9.x. The function `__gnttab_cache_flush` handles GNTTABOP_cache_flush grant table operations. It checks to see if the calling domain is the owner of the page that is to be operated on. If it is not, the owner's grant table is checked
- affected < 4.5.5_16-22.28.1fixed 4.5.5_16-22.28.1
A domain cleanup issue was discovered in the C xenstore daemon (aka cxenstored) in Xen through 4.9.x. When shutting down a VM with a stubdomain, a race in cxenstored may cause a double-free. The xenstored daemon may crash, resulting in a DoS of any parts of the system relying on
- affected < 4.5.5_16-22.28.1fixed 4.5.5_16-22.28.1
A parameter verification issue was discovered in Xen through 4.9.x. The function `alloc_heap_pages` allows callers to specify the first NUMA node that should be used for allocations through the `memflags` parameter; the node is extracted using the `MEMF_get_node` macro. While the
- affected < 4.5.5_20-22.36.3fixed 4.5.5_20-22.36.3
QEMU (aka Quick Emulator), when built with the VGA display emulator support, allows local guest OS privileged users to cause a denial of service (out-of-bounds read and QEMU process crash) via vectors involving display update.
- affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1
arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
- affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1
Xen allows local OS guest users to cause a denial of service (crash) or possibly obtain sensitive information or gain privileges via vectors involving transitive grants.
- affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
- affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1
Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.
- affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1
qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
- affected < 4.5.5_14-22.25.1fixed 4.5.5_14-22.25.1
The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.
- affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1
The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3.
- affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1
The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka X
- affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1
The grant-table feature in Xen through 4.8.x mishandles a GNTMAP_device_map and GNTMAP_host_map mapping, when followed by only a GNTMAP_host_map unmapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged ho
- affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
- affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1
Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
- affected < 4.5.5_12-22.18.1fixed 4.5.5_12-22.18.1
The vCPU context-switch implementation in Xen through 4.8.x improperly interacts with the Memory Protection Extensions (MPX) and Protection Key (PKU) features, which makes it easier for guest OS users to defeat ASLR and other protection mechanisms, aka XSA-220.
Page 2 of 3