VYPR

rpm package

suse/xen&distro=SUSE Linux Enterprise Server 12 SP4-ESPOS

pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-ESPOS

Vulnerabilities (4)

  • CVE-2022-42334Mar 21, 2023
    affected < 4.11.4_38-2.89.1fixed 4.11.4_38-2.89.1

    x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly

  • CVE-2022-42333Mar 21, 2023
    affected < 4.11.4_38-2.89.1fixed 4.11.4_38-2.89.1

    x86/HVM pinned cache attributes mis-handling T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] To allow cachability control for HVM guests with passed through devices, an interface exists to explicitly

  • CVE-2022-42332Mar 21, 2023
    affected < 4.11.4_38-2.89.1fixed 4.11.4_38-2.89.1

    x86 shadow plus log-dirty mode use-after-free In environments where host assisted address translation is necessary but Hardware Assisted Paging (HAP) is unavailable, Xen will run guests in so called shadow mode. Shadow mode maintains a pool of memory used for both shadow page tab

  • CVE-2022-42331Mar 21, 2023
    affected < 4.11.4_38-2.89.1fixed 4.11.4_38-2.89.1

    x86: speculative vulnerability in 32bit SYSCALL path Due to an oversight in the very original Spectre/Meltdown security work (XSA-254), one entrypath performs its speculation-safety actions too late. In some configurations, there is an unprotected RET instruction which can be att