rpm package
suse/xen&distro=SUSE OpenStack Cloud 7
pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%207
Vulnerabilities (84)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2019-11091 | — | < 4.7.6_06-43.51.1 | 4.7.6_06-43.51.1 | May 30, 2019 | Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c | ||
| CVE-2018-18849 | — | < 4.7.6_05-43.45.1 | 4.7.6_05-43.45.1 | Mar 17, 2019 | In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value. | ||
| CVE-2019-6778 | — | < 4.7.6_06-43.48.1 | 4.7.6_06-43.48.1 | Mar 17, 2019 | In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow. | ||
| CVE-2018-19967 | — | < 4.7.6_06-43.48.1 | 4.7.6_06-43.48.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix. | ||
| CVE-2018-19966 | — | < 4.7.6_05-43.45.1 | 4.7.6_05-43.45.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be | ||
| CVE-2018-19965 | — | < 4.7.6_05-43.45.1 | 4.7.6_05-43.45.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a | ||
| CVE-2018-19962 | — | < 4.7.6_05-43.45.1 | 4.7.6_05-43.45.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones. | ||
| CVE-2018-19961 | — | < 4.7.6_05-43.45.1 | 4.7.6_05-43.45.1 | Dec 8, 2018 | An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes. | ||
| CVE-2018-19665 | — | < 4.7.6_05-43.45.1 | 4.7.6_05-43.45.1 | Dec 6, 2018 | The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption. | ||
| CVE-2018-17963 | — | < 4.7.6_05-43.42.1 | 4.7.6_05-43.42.1 | Oct 9, 2018 | qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact. | ||
| CVE-2018-15468 | — | < 4.7.6_05-43.42.1 | 4.7.6_05-43.42.1 | Aug 17, 2018 | An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably n | ||
| CVE-2018-3646 | — | < 4.7.6_04-43.39.1 | 4.7.6_04-43.39.1 | Aug 14, 2018 | Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis | ||
| CVE-2018-12893 | — | < 4.7.6_02-43.36.1 | 4.7.6_02-43.36.1 | Jul 2, 2018 | An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can | ||
| CVE-2018-12892 | — | < 4.7.6_02-43.36.1 | 4.7.6_02-43.36.1 | Jul 2, 2018 | An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supp | ||
| CVE-2018-12891 | — | < 4.7.6_02-43.36.1 | 4.7.6_02-43.36.1 | Jul 2, 2018 | An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing | ||
| CVE-2018-3665 | — | < 4.7.6_02-43.36.1 | 4.7.6_02-43.36.1 | Jun 21, 2018 | System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel. | ||
| CVE-2018-11806 | — | < 4.7.6_02-43.36.1 | 4.7.6_02-43.36.1 | Jun 13, 2018 | m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams. | ||
| CVE-2018-3639 | — | < 4.7.5_04-43.33.1 | 4.7.5_04-43.33.1 | May 22, 2018 | Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka | ||
| CVE-2018-8897 | — | < 4.7.5_02-43.30.1 | 4.7.5_02-43.30.1 | May 8, 2018 | A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP | ||
| CVE-2018-10472 | — | < 4.7.5_02-43.30.1 | 4.7.5_02-43.30.1 | Apr 27, 2018 | An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot. |
- CVE-2019-11091May 30, 2019affected < 4.7.6_06-43.51.1fixed 4.7.6_06-43.51.1
Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products c
- CVE-2018-18849Mar 17, 2019affected < 4.7.6_05-43.45.1fixed 4.7.6_05-43.45.1
In Qemu 3.0.0, lsi_do_msgin in hw/scsi/lsi53c895a.c allows out-of-bounds access by triggering an invalid msg_len value.
- CVE-2019-6778Mar 17, 2019affected < 4.7.6_06-43.48.1fixed 4.7.6_06-43.48.1
In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow.
- CVE-2018-19967Dec 8, 2018affected < 4.7.6_06-43.48.1fixed 4.7.6_06-43.48.1
An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
- CVE-2018-19966Dec 8, 2018affected < 4.7.6_05-43.45.1fixed 4.7.6_05-43.45.1
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists be
- CVE-2018-19965Dec 8, 2018affected < 4.7.6_05-43.45.1fixed 4.7.6_05-43.45.1
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (a
- CVE-2018-19962Dec 8, 2018affected < 4.7.6_05-43.45.1fixed 4.7.6_05-43.45.1
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
- CVE-2018-19961Dec 8, 2018affected < 4.7.6_05-43.45.1fixed 4.7.6_05-43.45.1
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
- CVE-2018-19665Dec 6, 2018affected < 4.7.6_05-43.45.1fixed 4.7.6_05-43.45.1
The Bluetooth subsystem in QEMU mishandles negative values for length variables, leading to memory corruption.
- CVE-2018-17963Oct 9, 2018affected < 4.7.6_05-43.42.1fixed 4.7.6_05-43.42.1
qemu_deliver_packet_iov in net/net.c in Qemu accepts packet sizes greater than INT_MAX, which allows attackers to cause a denial of service or possibly have unspecified other impact.
- CVE-2018-15468Aug 17, 2018affected < 4.7.6_05-43.42.1fixed 4.7.6_05-43.42.1
An issue was discovered in Xen through 4.11.x. The DEBUGCTL MSR contains several debugging features, some of which virtualise cleanly, but some do not. In particular, Branch Trace Store is not virtualised by the processor, and software has to be careful to configure it suitably n
- CVE-2018-3646Aug 14, 2018affected < 4.7.6_04-43.39.1fixed 4.7.6_04-43.39.1
Systems with microprocessors utilizing speculative execution and address translations may allow unauthorized disclosure of information residing in the L1 data cache to an attacker with local user access with guest OS privilege via a terminal page fault and a side-channel analysis
- CVE-2018-12893Jul 2, 2018affected < 4.7.6_02-43.36.1fixed 4.7.6_02-43.36.1
An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a guest. A malicious PV guest can
- CVE-2018-12892Jul 2, 2018affected < 4.7.6_02-43.36.1fixed 4.7.6_02-43.36.1
An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) users may be able to write to supp
- CVE-2018-12891Jul 2, 2018affected < 4.7.6_02-43.36.1fixed 4.7.6_02-43.36.1
An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such checks. By suitably enforcing
- CVE-2018-3665Jun 21, 2018affected < 4.7.6_02-43.36.1fixed 4.7.6_02-43.36.1
System software utilizing Lazy FP state restore technique on systems using Intel Core-based microprocessors may potentially allow a local process to infer data from another process through a speculative execution side channel.
- CVE-2018-11806Jun 13, 2018affected < 4.7.6_02-43.36.1fixed 4.7.6_02-43.36.1
m_cat in slirp/mbuf.c in Qemu has a heap-based buffer overflow via incoming fragmented datagrams.
- CVE-2018-3639May 22, 2018affected < 4.7.5_04-43.33.1fixed 4.7.5_04-43.33.1
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka
- CVE-2018-8897May 8, 2018affected < 4.7.5_02-43.30.1fixed 4.7.5_02-43.30.1
A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that are deferred by MOV SS or POP
- CVE-2018-10472Apr 27, 2018affected < 4.7.5_02-43.30.1fixed 4.7.5_02-43.30.1
An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users (in certain configurations) to read arbitrary dom0 files via QMP live insertion of a CDROM, in conjunction with specifying the target file as the backing file of a snapshot.
Page 4 of 5