rpm package
suse/xen&distro=SUSE OpenStack Cloud 7
pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%207
Vulnerabilities (84)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2020-25597 | — | < 4.7.6_10-43.67.1 | 4.7.6_10-43.67.1 | Sep 23, 2020 | An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life tim | ||
| CVE-2020-25595 | — | < 4.7.6_10-43.67.1 | 4.7.6_10-43.67.1 | Sep 23, 2020 | An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specific | ||
| CVE-2020-14364 | — | < 4.7.6_10-43.67.1 | 4.7.6_10-43.67.1 | Aug 31, 2020 | An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw all | ||
| CVE-2020-15567 | — | < 4.7.6_10-43.67.1 | 4.7.6_10-43.67.1 | Jul 7, 2020 | An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-at | ||
| CVE-2020-15565 | — | < 4.7.6_10-43.67.1 | 4.7.6_10-43.67.1 | Jul 7, 2020 | An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require fl | ||
| CVE-2020-0543 | — | < 4.7.6_10-43.67.1 | 4.7.6_10-43.67.1 | Jun 15, 2020 | Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access. | ||
| CVE-2020-11742 | — | < 4.7.6_08-43.64.1 | 4.7.6_08-43.64.1 | Apr 14, 2020 | An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 int | ||
| CVE-2020-11741 | — | < 4.7.6_08-43.64.1 | 4.7.6_08-43.64.1 | Apr 14, 2020 | An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the admini | ||
| CVE-2020-11740 | — | < 4.7.6_08-43.64.1 | 4.7.6_08-43.64.1 | Apr 14, 2020 | An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. Thes | ||
| CVE-2020-11739 | — | < 4.7.6_08-43.64.1 | 4.7.6_08-43.64.1 | Apr 14, 2020 | An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processo | ||
| CVE-2020-8608 | — | < 4.7.6_08-43.64.1 | 4.7.6_08-43.64.1 | Feb 6, 2020 | In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code. | ||
| CVE-2020-7211 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Jan 21, 2020 | tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\ directory traversal on Windows. | ||
| CVE-2019-19577 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically | ||
| CVE-2019-19578 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at i | ||
| CVE-2019-19580 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in rest | ||
| CVE-2019-19581 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over | ||
| CVE-2019-19583 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Dec 11, 2019 | An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the nee | ||
| CVE-2019-19579 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Dec 4, 2019 | An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the us | ||
| CVE-2018-12207 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Nov 14, 2019 | Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access. | ||
| CVE-2019-11135 | — | < 4.7.6_06-43.59.1 | 4.7.6_06-43.59.1 | Nov 14, 2019 | TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. |
- CVE-2020-25597Sep 23, 2020affected < 4.7.6_10-43.67.1fixed 4.7.6_10-43.67.1
An issue was discovered in Xen through 4.14.x. There is mishandling of the constraint that once-valid event channels may not turn invalid. Logic in the handling of event channel operations in Xen assumes that an event channel, once valid, will not become invalid over the life tim
- CVE-2020-25595Sep 23, 2020affected < 4.7.6_10-43.67.1fixed 4.7.6_10-43.67.1
An issue was discovered in Xen through 4.14.x. The PCI passthrough code improperly uses register data. Code paths in Xen's MSI handling have been identified that act on unsanitized values read back from device hardware registers. While devices strictly compliant with PCI specific
- CVE-2020-14364Aug 31, 2020affected < 4.7.6_10-43.67.1fixed 4.7.6_10-43.67.1
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw all
- CVE-2020-15567Jul 7, 2020affected < 4.7.6_10-43.67.1fixed 4.7.6_10-43.67.1
An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circumstances use a series of non-at
- CVE-2020-15565Jul 7, 2020affected < 4.7.6_10-43.67.1fixed 4.7.6_10-43.67.1
An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and CPU, changes to them require fl
- CVE-2020-0543Jun 15, 2020affected < 4.7.6_10-43.67.1fixed 4.7.6_10-43.67.1
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- CVE-2020-11742Apr 14, 2020affected < 4.7.6_08-43.64.1fixed 4.7.6_08-43.64.1
An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. The fix for CVE-2017-12135 int
- CVE-2020-11741Apr 14, 2020affected < 4.7.6_08-43.64.1fixed 4.7.6_08-43.64.1
An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profiling was enabled by the admini
- CVE-2020-11740Apr 14, 2020affected < 4.7.6_08-43.64.1fixed 4.7.6_08-43.64.1
An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been enabled for those guests. Thes
- CVE-2020-11739Apr 14, 2020affected < 4.7.6_08-43.64.1fixed 4.7.6_08-43.64.1
An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier. On Arm, this means a processo
- CVE-2020-8608Feb 6, 2020affected < 4.7.6_08-43.64.1fixed 4.7.6_08-43.64.1
In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading to a buffer overflow in later code.
- CVE-2020-7211Jan 21, 2020affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
tftp.c in libslirp 4.1.0, as used in QEMU 4.2.0, does not prevent ..\ directory traversal on Windows.
- CVE-2019-19577Dec 11, 2019affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically
- CVE-2019-19578Dec 11, 2019affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at i
- CVE-2019-19580Dec 11, 2019affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in rest
- CVE-2019-19581Dec 11, 2019affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over
- CVE-2019-19583Dec 11, 2019affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the nee
- CVE-2019-19579Dec 4, 2019affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device (and assignable-add is not used), because of an incomplete fix for CVE-2019-18424. XSA-302 relies on the us
- CVE-2018-12207Nov 14, 2019affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
Improper invalidation for page table updates by a virtual guest operating system for multiple Intel(R) Processors may allow an authenticated user to potentially enable denial of service of the host system via local access.
- CVE-2019-11135Nov 14, 2019affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Page 2 of 5