VYPR

rpm package

suse/xen&distro=SUSE OpenStack Cloud 7

pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%207

Vulnerabilities (84)

  • CVE-2019-18425Oct 31, 2019
    affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1

    An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table acce

  • CVE-2019-18424Oct 31, 2019
    affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1

    An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI devi

  • CVE-2019-18421Oct 31, 2019
    affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1

    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for

  • CVE-2019-18420Oct 31, 2019
    affected < 4.7.6_06-43.59.1fixed 4.7.6_06-43.59.1

    An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via a VCPUOP_initialise hypercall. hypercall_create_continuation() is a variadic function which uses a printf-like format string to interpret its parameters. Error handling f

  • CVE-2019-17340Oct 8, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.

  • CVE-2019-17341Oct 8, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.

  • CVE-2019-17342Oct 8, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.

  • CVE-2019-17343Oct 8, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.

  • CVE-2019-17344Oct 8, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.

  • CVE-2019-17346Oct 8, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.

  • CVE-2019-17347Oct 8, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).

  • CVE-2019-17348Oct 8, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.

  • CVE-2019-12068Sep 24, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    In QEMU 1:4.1-1, 1:2.1+dfsg-12+deb8u6, 1:2.8+dfsg-6+deb9u8, 1:3.1+dfsg-8~deb10u1, 1:3.1+dfsg-8+deb10u2, and 1:2.1+dfsg-12+deb8u12 (fixed), when executing script in lsi_execute_script(), the LSI scsi adapter emulator advances 's->dsp' index to read next opcode. This can lead to an

  • CVE-2019-15890Sep 6, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.

  • CVE-2019-14378Jul 29, 2019
    affected < 4.7.6_06-43.54.2fixed 4.7.6_06-43.54.2

    ip_reass in ip_input.c in libslirp 4.0.0 has a heap-based buffer overflow via a large packet because it mishandles a case involving the first fragment.

  • CVE-2019-9824Jun 3, 2019
    affected < 4.7.6_06-43.48.1fixed 4.7.6_06-43.48.1

    tcp_emu in slirp/tcp_subr.c (aka slirp/src/tcp_subr.c) in QEMU 3.0.0 uses uninitialized data in an snprintf call, leading to Information disclosure.

  • CVE-2018-20815May 31, 2019
    affected < 4.7.6_06-43.51.1fixed 4.7.6_06-43.51.1

    In QEMU 3.1.0, load_device_tree in device_tree.c calls the deprecated load_image function, which has a buffer overflow risk.

  • CVE-2018-12130May 30, 2019
    affected < 4.7.6_06-43.51.1fixed 4.7.6_06-43.51.1

    Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found h

  • CVE-2018-12127May 30, 2019
    affected < 4.7.6_06-43.51.1fixed 4.7.6_06-43.51.1

    Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here:

  • CVE-2018-12126May 30, 2019
    affected < 4.7.6_06-43.51.1fixed 4.7.6_06-43.51.1

    Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found