Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.850980
Category:SuSE Local Security Checks
Title:SUSE: Security Advisory for Xen (SUSE-SU-2014:0446-1)
Summary:The remote host is missing an update for the 'Xen'; package(s) announced via the referenced advisory.
Description:Summary:
The remote host is missing an update for the 'Xen'
package(s) announced via the referenced advisory.

Vulnerability Insight:
The SUSE Linux Enterprise Server 11 Service Pack 1 LTSS Xen
hypervisor and toolset have been updated to fix various
security issues and some bugs.

The following security issues have been addressed:

*

XSA-84: CVE-2014-1894: Xen 3.2 (and presumably
earlier) exhibit both problems with the overflow issue
being present for more than just the suboperations listed
above. (bnc#860163)

*

XSA-84: CVE-2014-1892 CVE-2014-1893: Xen 3.3 through
4.1, while not affected by the above overflow, have a
different overflow issue on FLASK_{GET, SET}BOOL and expose
unreasonably large memory allocation to arbitrary guests.
(bnc#860163)

*

XSA-84: CVE-2014-1891: The FLASK_{GET, SET}BOOL,
FLASK_USER and FLASK_CONTEXT_TO_SID suboperations of the
flask hypercall are vulnerable to an integer overflow on
the input size. The hypercalls attempt to allocate a buffer
which is 1 larger than this size and is therefore
vulnerable to integer overflow and an attempt to allocate
then access a zero byte buffer. (bnc#860163)

*

XSA-82: CVE-2013-6885: The microcode on AMD 16h 00h
through 0Fh processors does not properly handle the
interaction between locked instructions and write-combined
memory types, which allows local users to cause a denial of
service (system hang) via a crafted application, aka the
errata 793 issue. (bnc#853049)

*

XSA-76: CVE-2013-4554: Xen 3.0.3 through 4.1.x
(possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x
(possibly 4.3.1) does not properly prevent access to
hypercalls, which allows local guest users to gain
privileges via a crafted application running in ring 1 or
2. (bnc#849668)

*

XSA-74: CVE-2013-4553: The XEN_DOMCTL_getmemlist
hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does
not always obtain the page_alloc_lock and mm_rwlock in the
same order, which allows local guest administrators to
cause a denial of service (host deadlock). (bnc#849667)

*

XSA-73: CVE-2013-4494: Xen before 4.1.x, 4.2.x, and
4.3.x does not take the page_alloc_lock and
grant_table.lock in the same order, which allows local
guest administrators with access to multiple vcpus to cause
a denial of service (host deadlock) via unspecified
vectors. (bnc#848657)

*

XSA-67: CVE-2013-4368: The outs instruction emulation
in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or
GS: segment override, uses an uninitialized variable as a
segment base, which allows local 64-bit PV guests to obtain
sensitive information (hypervisor stack content) via
unspecified vectors related to stale d ...

Description truncated, please see the referenced URL(s) for more information.

Affected Software/OS:
Xen on SUSE Linux Enterprise Server 11 SP1 LTSS

Solution:
Please install the updated package(s).

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2006-1056
1015966
http://securitytracker.com/id?1015966
17600
http://www.securityfocus.com/bid/17600
19715
http://secunia.com/advisories/19715
19724
http://secunia.com/advisories/19724
19735
http://secunia.com/advisories/19735
20060419 FreeBSD Security Advisory FreeBSD-SA-06:14.fpu
http://www.securityfocus.com/archive/1/431341
20061113 VMSA-2006-0005 - VMware ESX Server 2.5.4 Upgrade Patch 1
http://www.securityfocus.com/archive/1/451419/100/200/threaded
20061113 VMSA-2006-0006 - VMware ESX Server 2.5.3 Upgrade Patch 4
http://www.securityfocus.com/archive/1/451404/100/0/threaded
20061113 VMSA-2006-0007 - VMware ESX Server 2.1.3 Upgrade Patch 2
http://www.securityfocus.com/archive/1/451417/100/200/threaded
20061113 VMSA-2006-0009 - VMware ESX Server 3.0.0 AMD fxsave/restore issue
http://www.securityfocus.com/archive/1/451421/100/0/threaded
20398
http://secunia.com/advisories/20398
20671
http://secunia.com/advisories/20671
20716
http://secunia.com/advisories/20716
20914
http://secunia.com/advisories/20914
21035
http://secunia.com/advisories/21035
21136
http://secunia.com/advisories/21136
21465
http://secunia.com/advisories/21465
21983
http://secunia.com/advisories/21983
22417
http://secunia.com/advisories/22417
22875
http://secunia.com/advisories/22875
22876
http://secunia.com/advisories/22876
24746
http://www.osvdb.org/24746
24807
http://www.osvdb.org/24807
ADV-2006-1426
http://www.vupen.com/english/advisories/2006/1426
ADV-2006-1475
http://www.vupen.com/english/advisories/2006/1475
ADV-2006-2554
http://www.vupen.com/english/advisories/2006/2554
ADV-2006-4353
http://www.vupen.com/english/advisories/2006/4353
ADV-2006-4502
http://www.vupen.com/english/advisories/2006/4502
DSA-1097
http://www.debian.org/security/2006/dsa-1097
DSA-1103
http://www.debian.org/security/2006/dsa-1103
FEDORA-2006-423
http://lwn.net/Alerts/180820/
FreeBSD-SA-06:14
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:14.fpu.asc
RHSA-2006:0437
http://www.redhat.com/support/errata/RHSA-2006-0437.html
RHSA-2006:0575
http://www.redhat.com/support/errata/RHSA-2006-0575.html
RHSA-2006:0579
http://www.redhat.com/support/errata/RHSA-2006-0579.html
SUSE-SA:2006:028
http://www.novell.com/linux/security/advisories/2006-05-31.html
SUSE-SU-2014:0446
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
USN-302-1
http://www.ubuntu.com/usn/usn-302-1
[linux-kernel] 20060419 RE: Linux 2.6.16.9
http://marc.info/?l=linux-kernel&m=114548768214478&w=2
amd-fpu-information-disclosure(25871)
https://exchange.xforce.ibmcloud.com/vulnerabilities/25871
http://kb.vmware.com/kb/2533126
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.9
http://security.freebsd.org/advisories/FreeBSD-SA-06:14-amd.txt
http://support.avaya.com/elmodocs2/security/ASA-2006-180.htm
http://support.avaya.com/elmodocs2/security/ASA-2006-200.htm
http://www.vmware.com/download/esx/esx-213-200610-patch.html
http://www.vmware.com/download/esx/esx-254-200610-patch.html
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187910
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=187911
oval:org.mitre.oval:def:9995
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9995
Common Vulnerability Exposure (CVE) ID: CVE-2007-0998
BugTraq ID: 22967
http://www.securityfocus.com/bid/22967
http://fedoranews.org/cms/node/2803
http://fedoranews.org/cms/node/2802
http://osvdb.org/34304
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10486
RedHat Security Advisories: RHSA-2007:0114
http://rhn.redhat.com/errata/RHSA-2007-0114.html
http://www.securitytracker.com/id?1017764
http://secunia.com/advisories/24575
http://secunia.com/advisories/51413
SuSE Security Announcement: SUSE-SU-2014:0446 (Google Search)
SuSE Security Announcement: openSUSE-SU-2012:1572 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
SuSE Security Announcement: openSUSE-SU-2012:1573 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html
http://www.vupen.com/english/advisories/2007/1019
http://www.vupen.com/english/advisories/2007/1020
http://www.vupen.com/english/advisories/2007/1021
XForce ISS Database: fedora-xen-qemuvnc-information-disclosure(33085)
https://exchange.xforce.ibmcloud.com/vulnerabilities/33085
Common Vulnerability Exposure (CVE) ID: CVE-2012-3497
1027482
http://www.securitytracker.com/id?1027482
50472
http://secunia.com/advisories/50472
51324
http://secunia.com/advisories/51324
51352
http://secunia.com/advisories/51352
51413
55082
http://secunia.com/advisories/55082
55410
http://www.securityfocus.com/bid/55410
85199
http://osvdb.org/85199
GLSA-201309-24
http://security.gentoo.org/glsa/glsa-201309-24.xml
GLSA-201604-03
https://security.gentoo.org/glsa/201604-03
SUSE-SU-2012:1486
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html
SUSE-SU-2012:1487
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html
[Xen-announce] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities
http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
[oss-security] 20120905 Xen Security Advisory 15 (CVE-2012-3497) - multiple TMEM hypercall vulnerabilities
http://www.openwall.com/lists/oss-security/2012/09/05/8
http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
openSUSE-SU-2012:1572
openSUSE-SU-2012:1573
xen-tmem-priv-esc(78268)
https://exchange.xforce.ibmcloud.com/vulnerabilities/78268
Common Vulnerability Exposure (CVE) ID: CVE-2012-4411
50493
http://secunia.com/advisories/50493
55442
http://www.securityfocus.com/bid/55442
DSA-2543
http://www.debian.org/security/2012/dsa-2543
[Xen-announce] 20120906 Xen Security Advisory 19 - guest administrator can access qemu monitor console
http://lists.xen.org/archives/html/xen-announce/2012-09/msg00007.html
[Xen-announce] 20120907 Xen Security Advisory 19 (CVE-2012-4411) - guest administrator can access qemu monitor console
http://lists.xen.org/archives/html/xen-announce/2012-09/msg00008.html
[oss-security] 20120906 Re: Xen Security Advisory 19 - guest administrator can access qemu monitor console
http://www.openwall.com/lists/oss-security/2012/09/06/7
[oss-security] 20120906 Xen Security Advisory 19 - guest administrator can access qemu monitor console
http://www.openwall.com/lists/oss-security/2012/09/06/2
[oss-security] 20120907 Xen Security Advisory 19 (CVE-2012-4411) - guest administrator can access qemu monitor console
http://www.openwall.com/lists/oss-security/2012/09/07/5
Common Vulnerability Exposure (CVE) ID: CVE-2012-4535
1027759
http://www.securitytracker.com/id?1027759
51200
http://secunia.com/advisories/51200
51468
http://secunia.com/advisories/51468
56498
http://www.securityfocus.com/bid/56498
87298
http://osvdb.org/87298
DSA-2582
http://www.debian.org/security/2012/dsa-2582
RHSA-2012:1540
http://rhn.redhat.com/errata/RHSA-2012-1540.html
SUSE-SU-2012:1615
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
SUSE-SU-2014:0470
http://lists.opensuse.org/opensuse-security-announce/2014-04/msg00000.html
[Xen-announce] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability
http://lists.xen.org/archives/html/xen-announce/2012-11/msg00001.html
[oss-security] 20121113 Xen Security Advisory 20 (CVE-2012-4535) - Timer overflow DoS vulnerability
http://www.openwall.com/lists/oss-security/2012/11/13/1
xen-vcpu-dos(80022)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80022
Common Vulnerability Exposure (CVE) ID: CVE-2012-4537
1027761
http://www.securitytracker.com/id?1027761
87307
http://osvdb.org/87307
[Xen-announce] 20121113 Xen Security Advisory 22 (CVE-2012-4537) - Memory mapping failure DoS vulnerability
http://lists.xen.org/archives/html/xen-announce/2012-11/msg00005.html
[oss-security] 20121113 Xen Security Advisory 22 (CVE-2012-4537) - Memory mapping failure DoS vulnerability
http://www.openwall.com/lists/oss-security/2012/11/13/6
xen-setp2mentry-dos(80024)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80024
Common Vulnerability Exposure (CVE) ID: CVE-2012-4538
1027762
http://www.securitytracker.com/id?1027762
87306
http://osvdb.org/87306
[Xen-announce] 20121113 Xen Security Advisory 23 (CVE-2012-4538) - Unhooking empty PAE entries DoS vulnerability
http://lists.xen.org/archives/html/xen-announce/2012-11/msg00004.html
[oss-security] 20121113 Xen Security Advisory 23 (CVE-2012-4538) - Unhooking empty PAE entries DoS vulnerability
http://www.openwall.com/lists/oss-security/2012/11/13/3
xen-hvmop-dos(80025)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80025
Common Vulnerability Exposure (CVE) ID: CVE-2012-4539
1027763
http://www.securitytracker.com/id?1027763
87305
http://www.osvdb.org/87305
[Xen-announce] 20121113 Xen Security Advisory 24 (CVE-2012-4539) - Grant table hypercall infinite loop DoS vulnerability
http://lists.xen.org/archives/html/xen-announce/2012-11/msg00002.html
[oss-security] 20121113 Xen Security Advisory 24 (CVE-2012-4539) - Grant table hypercall infinite loop DoS vulnerability
http://www.openwall.com/lists/oss-security/2012/11/13/4
openSUSE-SU-2012:1685
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
xen-gnttabopgetstatus-dos(80026)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80026
Common Vulnerability Exposure (CVE) ID: CVE-2012-4544
1027699
http://www.securitytracker.com/id?1027699
51071
http://secunia.com/advisories/51071
56289
http://www.securityfocus.com/bid/56289
86619
http://osvdb.org/86619
DSA-2636
http://www.debian.org/security/2013/dsa-2636
FEDORA-2012-17135
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/092050.html
FEDORA-2012-17204
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091844.html
FEDORA-2012-17408
http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html
RHSA-2013:0241
http://rhn.redhat.com/errata/RHSA-2013-0241.html
SUSE-SU-2014:0411
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html
[oss-security] 20121026 Xen Security Advisory 25 (CVE-2012-4544) - Xen domain builder Out-of-memory due to malicious kernel/ramdisk
http://www.openwall.com/lists/oss-security/2012/10/26/3
xen-pvdomainbuilder-dos(79617)
https://exchange.xforce.ibmcloud.com/vulnerabilities/79617
Common Vulnerability Exposure (CVE) ID: CVE-2012-5510
51397
http://secunia.com/advisories/51397
51486
http://secunia.com/advisories/51486
51487
http://secunia.com/advisories/51487
56794
http://www.securityfocus.com/bid/56794
88128
http://www.osvdb.org/88128
[oss-security] 20121203 Xen Security Advisory 26 (CVE-2012-5510) - Grant table version switch list corruption vulnerability
http://www.openwall.com/lists/oss-security/2012/12/03/6
http://support.citrix.com/article/CTX135777
openSUSE-SU-2012:1687
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
openSUSE-SU-2013:0133
http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
openSUSE-SU-2013:0636
http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
openSUSE-SU-2013:0637
http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
xen-grant-table-dos(80478)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80478
Common Vulnerability Exposure (CVE) ID: CVE-2012-5511
56796
http://www.securityfocus.com/bid/56796
88129
http://www.osvdb.org/88129
[oss-security] 20121203 Xen Security Advisory 27 (CVE-2012-5511) - several HVM operations do not validate the range of their inputs
http://www.openwall.com/lists/oss-security/2012/12/03/10
xen-hvm-dos(80484)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80484
Common Vulnerability Exposure (CVE) ID: CVE-2012-5513
51495
http://secunia.com/advisories/51495
56797
http://www.securityfocus.com/bid/56797
88131
http://www.osvdb.org/88131
SUSE-SU-2012:1606
http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html
[oss-security] 20121203 Xen Security Advisory 29 (CVE-2012-5513) - XENMEM_exchange may overwrite hypervisor memory
http://www.openwall.com/lists/oss-security/2012/12/03/11
xen-xenmemexchange-priv-esc(80482)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80482
Common Vulnerability Exposure (CVE) ID: CVE-2012-5514
56803
http://www.securityfocus.com/bid/56803
88130
http://www.osvdb.org/88130
[oss-security] 20121203 Xen Security Advisory 30 (CVE-2012-5514) - Broken error handling in guest_physmap_mark_populate_on_demand()
http://www.openwall.com/lists/oss-security/2012/12/03/12
xen-guestphysmapmark-dos(80483)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80483
Common Vulnerability Exposure (CVE) ID: CVE-2012-5515
56798
http://www.securityfocus.com/bid/56798
88127
http://www.osvdb.org/88127
[Xen-announce] 20121203 Xen Security Advisory 31 (CVE-2012-5515) - Several memory hypercall operations allow invalid extent order values
http://lists.xen.org/archives/html/xen-announce/2012-12/msg00001.html
[oss-security] 20121203 Xen Security Advisory 31 (CVE-2012-5515) - Several memory hypercall operations allow invalid extent order values
http://www.openwall.com/lists/oss-security/2012/12/03/9
xen-extentorder-dos(80479)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80479
Common Vulnerability Exposure (CVE) ID: CVE-2012-5634
[oss-security] 20130109 Xen Security Advisory 33 (CVE-2012-5634) - VT-d interrupt remapping source validation flaw
http://www.openwall.com/lists/oss-security/2013/01/09/5
openSUSE-SU-2013:0912
http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html
Common Vulnerability Exposure (CVE) ID: CVE-2012-6075
57420
http://www.securityfocus.com/bid/57420
DSA-2607
http://www.debian.org/security/2013/dsa-2607
DSA-2608
http://www.debian.org/security/2013/dsa-2608
DSA-2619
http://www.debian.org/security/2013/dsa-2619
FEDORA-2013-0934
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097705.html
FEDORA-2013-0965
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097575.html
FEDORA-2013-0971
http://lists.fedoraproject.org/pipermail/package-announce/2013-January/097541.html
RHSA-2013:0599
http://rhn.redhat.com/errata/RHSA-2013-0599.html
RHSA-2013:0608
http://rhn.redhat.com/errata/RHSA-2013-0608.html
RHSA-2013:0609
http://rhn.redhat.com/errata/RHSA-2013-0609.html
RHSA-2013:0610
http://rhn.redhat.com/errata/RHSA-2013-0610.html
RHSA-2013:0639
http://rhn.redhat.com/errata/RHSA-2013-0639.html
USN-1692-1
http://www.ubuntu.com/usn/USN-1692-1
[Qemu-devel] 20121205 [PATCH] e1000: Discard oversized packets based on SBP|LPE
http://lists.nongnu.org/archive/html/qemu-devel/2012-12/msg00533.html
[oss-security] 20121229 Re: CVE request: qemu e1000 emulated device gues-side buffer overflow
http://www.openwall.com/lists/oss-security/2012/12/30/1
http://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=b0d9ffcd0251161c7c92f94804dcf599dfa3edeb
https://bugzilla.redhat.com/show_bug.cgi?id=889301
Common Vulnerability Exposure (CVE) ID: CVE-2012-6333
BugTraq ID: 56796
SuSE Security Announcement: SUSE-SU-2012:1615 (Google Search)
XForce ISS Database: xen-hvm-dos(80484)
Common Vulnerability Exposure (CVE) ID: CVE-2013-0153
51881
http://secunia.com/advisories/51881
57745
http://www.securityfocus.com/bid/57745
89867
http://osvdb.org/89867
RHSA-2013:0847
http://rhn.redhat.com/errata/RHSA-2013-0847.html
[oss-security] 20130205 Xen Security Advisory 36 (CVE-2013-0153) - interrupt remap entries shared and old ones not cleared on AMD IOMMUs
http://www.openwall.com/lists/oss-security/2013/02/05/7
xen-amdiommu-dos(81831)
https://exchange.xforce.ibmcloud.com/vulnerabilities/81831
Common Vulnerability Exposure (CVE) ID: CVE-2013-0154
1027937
http://www.securitytracker.com/id?1027937
57159
http://www.securityfocus.com/bid/57159
88913
http://osvdb.org/88913
[oss-security] 20130104 Xen Security Advisory 37 (CVE-2013-0154) - Hypervisor crash due to incorrect ASSERT (debug build only)
http://www.openwall.com/lists/oss-security/2013/01/04/2
http://seclists.org/oss-sec/2013/q1/att-17/xsa37-4_2.patch
xen-hypercall-dos(80977)
https://exchange.xforce.ibmcloud.com/vulnerabilities/80977
Common Vulnerability Exposure (CVE) ID: CVE-2013-1432
Debian Security Information: DSA-3006 (Google Search)
http://www.debian.org/security/2014/dsa-3006
http://www.openwall.com/lists/oss-security/2013/06/26/5
Common Vulnerability Exposure (CVE) ID: CVE-2013-1442
http://security.gentoo.org/glsa/glsa-201407-03.xml
http://www.openwall.com/lists/oss-security/2013/09/25/2
http://www.securitytracker.com/id/1029090
SuSE Security Announcement: openSUSE-SU-2013:1636 (Google Search)
http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html
Common Vulnerability Exposure (CVE) ID: CVE-2013-1917
1028455
http://www.securitytracker.com/id/1028455
DSA-2662
http://www.debian.org/security/2012/dsa-2662
FEDORA-2013-6723
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html
[oss-security] 20130418 Xen Security Advisory 44 (CVE-2013-1917) - Xen PV DoS vulnerability with SYSENTER
http://www.openwall.com/lists/oss-security/2013/04/18/8
Common Vulnerability Exposure (CVE) ID: CVE-2013-1918
53187
http://secunia.com/advisories/53187
59615
http://www.securityfocus.com/bid/59615
DSA-2666
http://www.debian.org/security/2013/dsa-2666
FEDORA-2013-7432
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105533.html
[oss-security] 20130502 Xen Security Advisory 45 (CVE-2013-1918) - Several long latency operations are not preemptible
http://www.openwall.com/lists/oss-security/2013/05/02/8
Common Vulnerability Exposure (CVE) ID: CVE-2013-1919
59292
http://www.securityfocus.com/bid/59292
http://www.debian.org/security/2013/dsa-2662
FEDORA-2013-6641
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104538.html
[oss-security] 20130418 Xen Security Advisory 46 (CVE-2013-1919) - Several access permission issues with IRQs for unprivileged guests
http://www.openwall.com/lists/oss-security/2013/04/18/6
Common Vulnerability Exposure (CVE) ID: CVE-2013-1920
1028388
http://www.securitytracker.com/id/1028388
52857
http://secunia.com/advisories/52857
58880
http://www.securityfocus.com/bid/58880
92050
http://osvdb.org/92050
[Xen-announce] 20130404 Xen Security Advisory 47 (CVE-2013-1920) - Potential use of freed memory in event channel operations
http://lists.xen.org/archives/html/xen-announce/2013-04/msg00000.html
[oss-security] 20130404 Xen Security Advisory 47 (CVE-2013-1920) - Potential use of freed memory in event channel operations
http://www.openwall.com/lists/oss-security/2013/04/04/7
xen-cve20131920-code-exec(83226)
https://exchange.xforce.ibmcloud.com/vulnerabilities/83226
Common Vulnerability Exposure (CVE) ID: CVE-2013-1952
53312
http://secunia.com/advisories/53312
59617
http://www.securityfocus.com/bid/59617
92984
http://osvdb.org/92984
[oss-security] 20130502 Xen Security Advisory 49 (CVE-2013-1952) - VT-d interrupt remapping source validation flaw for bridges
http://www.openwall.com/lists/oss-security/2013/05/02/9
xen-cve20131952-dos(83968)
https://exchange.xforce.ibmcloud.com/vulnerabilities/83968
Common Vulnerability Exposure (CVE) ID: CVE-2013-1964
1028459
http://www.securitytracker.com/id/1028459
59293
http://www.securityfocus.com/bid/59293
[oss-security] 20130418 Xen Security Advisory 50 (CVE-2013-1964) - grant table hypercall acquire/release imbalance
http://www.openwall.com/lists/oss-security/2013/04/18/9
Common Vulnerability Exposure (CVE) ID: CVE-2013-2072
59982
http://www.securityfocus.com/bid/59982
DSA-3041
http://www.debian.org/security/2014/dsa-3041
FEDORA-2013-8513
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106778.html
FEDORA-2013-8571
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106718.html
FEDORA-2013-8590
http://lists.fedoraproject.org/pipermail/package-announce/2013-May/106721.html
[oss-security] 20130517 Xen Security Advisory 56 (CVE-2013-2072) - Buffer overflow in xencontrol Python bindings affecting xend
http://www.openwall.com/lists/oss-security/2013/05/17/2
Common Vulnerability Exposure (CVE) ID: CVE-2013-2076
DSA-3006
[oss-security] 20130603 Xen Security Advisory 52 (CVE-2013-2076) - Information leak on XSAVE/XRSTOR capable AMD CPUs
http://www.openwall.com/lists/oss-security/2013/06/03/1
Common Vulnerability Exposure (CVE) ID: CVE-2013-2077
[oss-security] 20130603 Xen Security Advisory 53 (CVE-2013-2077) - Hypervisor crash due to missing exception recovery on XRSTOR
http://www.openwall.com/lists/oss-security/2013/06/03/2
Common Vulnerability Exposure (CVE) ID: CVE-2013-2194
[oss-security] 20130620 Re: Xen Security Advisory 55 - Multiple vulnerabilities in libelf PV kernel handling
http://www.openwall.com/lists/oss-security/2013/06/20/2
[oss-security] 20130620 Xen Security Advisory 55 (CVE-2013-2194,CVE-2013-2195,CVE-2013-2196) - Multiple vulnerabilities in libelf PV kernel handling
http://www.openwall.com/lists/oss-security/2013/06/20/4
http://support.citrix.com/article/CTX138058
Common Vulnerability Exposure (CVE) ID: CVE-2013-2195
Common Vulnerability Exposure (CVE) ID: CVE-2013-2196
Common Vulnerability Exposure (CVE) ID: CVE-2013-2211
[oss-security] 20130625 Re: Xen Security Advisory 57 - libxl allows guest write access to sensitive console related xenstore keys
http://www.openwall.com/lists/oss-security/2013/06/25/1
[oss-security] 20130626 Xen Security Advisory 57 (CVE-2013-2211) - libxl allows guest write access to sensitive console related xenstore keys
http://www.openwall.com/lists/oss-security/2013/06/26/4
Common Vulnerability Exposure (CVE) ID: CVE-2013-2212
GLSA-201504-04
https://security.gentoo.org/glsa/201504-04
SUSE-SU-2014:0372
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html
SUSE-SU-2014:0373
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html
[oss-security] 20130724 Xen Security Advisory 60 (CVE-2013-2212) - Excessive time to disable caching with HVM guests with PCI passthrough
http://www.openwall.com/lists/oss-security/2013/07/24/6
Common Vulnerability Exposure (CVE) ID: CVE-2013-4329
GLSA-201407-03
[Xen-devel] 20130701 [PATCH] libxl: suppress device assignment to HVM guest when there is no IOMMU
http://lists.xen.org/archives/html/xen-devel/2013-07/msg00066.html
[oss-security] 20130910 Re: Xen Security Advisory 61 - libxl partially sets up HVM passthrough even with disabled iommu
http://www.openwall.com/lists/oss-security/2013/09/10/4
Common Vulnerability Exposure (CVE) ID: CVE-2013-4355
RHSA-2013:1790
http://rhn.redhat.com/errata/RHSA-2013-1790.html
[oss-security] 20130930 Xen Security Advisory 63 (CVE-2013-4355) - Information leaks through I/O instruction emulation
http://www.openwall.com/lists/oss-security/2013/09/30/1
openSUSE-SU-2013:1636
Common Vulnerability Exposure (CVE) ID: CVE-2013-4361
[oss-security] 20130930 Xen Security Advisory 66 (CVE-2013-4361) - Information leak through fbld instruction emulation
http://www.openwall.com/lists/oss-security/2013/09/30/3
Common Vulnerability Exposure (CVE) ID: CVE-2013-4368
RHSA-2013:1449
http://rhn.redhat.com/errata/RHSA-2013-1449.html
[oss-security] 20131010 Xen Security Advisory 67 (CVE-2013-4368) - Information leak through outs instruction emulation
http://www.openwall.com/lists/oss-security/2013/10/10/10
xen-cve20134368-info-disc(87799)
https://exchange.xforce.ibmcloud.com/vulnerabilities/87799
Common Vulnerability Exposure (CVE) ID: CVE-2013-4494
RHSA-2014:0108
http://rhn.redhat.com/errata/RHSA-2014-0108.html
[oss-security] 20131101 Re: Xen Security Advisory 73 - Lock order reversal between page allocation and grant table locks
http://www.openwall.com/lists/oss-security/2013/11/01/3
[oss-security] 20131101 Xen Security Advisory 73 - Lock order reversal between page allocation and grant table locks
http://www.openwall.com/lists/oss-security/2013/11/01/2
openSUSE-SU-2013:1876
http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html
Common Vulnerability Exposure (CVE) ID: CVE-2013-4553
[oss-security] 20131126 Xen Security Advisory 74 (CVE-2013-4553) - Lock order reversal between page_alloc_lock and mm_rwlock
http://www.openwall.com/lists/oss-security/2013/11/26/8
Common Vulnerability Exposure (CVE) ID: CVE-2013-4554
RHSA-2014:0285
http://rhn.redhat.com/errata/RHSA-2014-0285.html
[oss-security] 20131126 Xen Security Advisory 76 (CVE-2013-4554) - Hypercalls exposed to privilege rings 1 and 2 of HVM guests
http://www.openwall.com/lists/oss-security/2013/11/26/9
Common Vulnerability Exposure (CVE) ID: CVE-2013-6885
1029415
http://www.securitytracker.com/id/1029415
55840
http://secunia.com/advisories/55840
63983
http://www.securityfocus.com/bid/63983
DSA-3128
http://www.debian.org/security/2015/dsa-3128
FEDORA-2013-22754
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/123553.html
FEDORA-2013-22866
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124199.html
FEDORA-2013-22888
http://lists.fedoraproject.org/pipermail/package-announce/2013-December/124195.html
SUSE-SU-2014:0459
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00026.html
[kernel] 20111225 Buildworld loop seg-fault update -- I believe it is hardware
http://lists.dragonflybsd.org/pipermail/kernel/2011-December/046594.html
[oss-security] 20131127 CVE-2013-6885 AMD Publ. 51810 Errata 793 system hang
http://openwall.com/lists/oss-security/2013/11/28/1
[oss-security] 20131202 Xen Security Advisory 82 (CVE-2013-6885) - Guest triggerable AMD CPU erratum may cause host to hang
http://www.openwall.com/lists/oss-security/2013/12/02/1
http://support.amd.com/TechDocs/51810_16h_00h-0Fh_Rev_Guide.pdf
http://www.zdnet.com/blog/hardware/amd-owns-up-to-cpu-bug/18924
https://bugzilla.redhat.com/show_bug.cgi?id=1035823
xen-cve20136885-dos(89335)
https://exchange.xforce.ibmcloud.com/vulnerabilities/89335
Common Vulnerability Exposure (CVE) ID: CVE-2014-1891
http://www.openwall.com/lists/oss-security/2014/02/07/12
http://www.openwall.com/lists/oss-security/2014/02/07/4
http://www.openwall.com/lists/oss-security/2014/02/10/8
SuSE Security Announcement: SUSE-SU-2014:0372 (Google Search)
SuSE Security Announcement: SUSE-SU-2014:0373 (Google Search)
Common Vulnerability Exposure (CVE) ID: CVE-2014-1892
Common Vulnerability Exposure (CVE) ID: CVE-2014-1893
Common Vulnerability Exposure (CVE) ID: CVE-2014-1894
CopyrightCopyright (C) 2015 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.