Search for packages
| purl | pkg:deb/debian/xen@4.4.0-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-285u-bk7z-sybs | PCI MSI mask bits inadvertently exposed to guests |
CVE-2015-4104
|
| VCID-71w3-tqqz-4yf2 | Host crash due to guest VMX instruction execution |
CVE-2013-4551
|
| VCID-7gt7-r3j9-cbb3 | A heap-based buffer overflow in QEMU could result in execution of arbitrary code. |
CVE-2015-3214
|
| VCID-7r2x-vm78-gkb3 | QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks |
CVE-2016-3710
|
| VCID-895c-wwg8-cbe5 | Cirrus VGA Heap overflow via display refresh |
CVE-2016-9603
XSA-211 |
| VCID-8pkj-jwhg-3ub7 | Use after free in QEMU/Xen block unplug protocol |
CVE-2015-5166
|
| VCID-8q9q-fs5n-gyfj | Privilege escalation via emulated floppy disk drive |
CVE-2015-3456
|
| VCID-8tn1-kvxa-m3ex | QEMU: Banked access to VGA memory (VBE) uses inconsistent bounds checks |
CVE-2016-3712
|
| VCID-9trf-swg1-wfb6 | possible null dereference when parsing vif ratelimiting info |
CVE-2013-4369
|
| VCID-a7w3-bhxr-rqhe | qemu-dm buffer overrun in MSI-X handling |
CVE-2015-8554
|
| VCID-aeh3-vzax-jqfh | cirrus_bitblt_cputovideo does not check if memory region is safe |
CVE-2017-2620
XSA-209 |
| VCID-awup-6h5b-uydc | Potential unintended writes to host MSI message data field via qemu |
CVE-2015-4103
|
| VCID-ba9f-7cxr-v7f9 | Lock order reversal between page allocation and grant table locks |
CVE-2013-4494
|
| VCID-bksh-c5ey-37f4 | Out-of-memory condition yielding memory corruption during IRQ setup |
CVE-2014-1642
|
| VCID-g39p-9sdm-tkbh | Lock order reversal between page_alloc_lock and mm_rwlock |
CVE-2013-4553
|
| VCID-g3ss-8y7t-m7ap | Guest triggerable qemu MSI-X pass-through error messages |
CVE-2015-4105
|
| VCID-g4cn-35nz-37gv | PHYSDEVOP_{prepare,release}_msix exposed to unprivileged guests |
CVE-2014-1666
|
| VCID-gnr1-nkyy-5bc5 | Information leak on AVX and/or LWP capable CPUs |
CVE-2013-1442
|
| VCID-gvg8-qk7q-zfhy | use-after-free in xc_cpupool_getinfo() under memory pressure |
CVE-2014-1950
|
| VCID-gyum-cdqq-nbb3 | misplaced free in ocaml xc_vcpu_getaffinity stub |
CVE-2013-4370
|
| VCID-j9w4-jjad-puhm | Unmediated PCI register access in qemu |
CVE-2015-4106
|
| VCID-krd6-2fmf-xbas | Information leaks through I/O instruction emulation |
CVE-2013-4355
|
| VCID-maj1-5zy9-qyab | qemu ioport array overflow |
CVE-2016-9637
|
| VCID-mgr6-48jn-cbeg | Unrestricted qemu logging |
CVE-2014-3672
|
| VCID-qwuf-ccyr-guav | Information leak through fbld instruction emulation |
CVE-2013-4361
|
| VCID-sj9v-4djq-ukf1 | libvchan failure handling malicious ring indexes |
CVE-2014-1896
|
| VCID-ssq4-ktcc-pbgp | use-after-free in libxl_list_cpupool under memory pressure |
CVE-2013-4371
|
| VCID-t9tu-mc8k-vygc | IOMMU TLB flushing may be inadvertently suppressed |
CVE-2013-6400
|
| VCID-tagr-5fpf-4bcj | Heap overflow in QEMU PCNET controller, allowing guest->host escape |
CVE-2015-3209
|
| VCID-tbgk-fwbt-cqa3 | qemu: ccid: buffer overflow in handling of VSC_ATR message |
CVE-2011-4111
|
| VCID-tw9g-92x5-hkcz | Insufficient TLB flushing in VT-d (iommu) code |
CVE-2013-6375
|
| VCID-ud2r-db8a-hqhx | Off-by-one error in FLASK_AVC_CACHESTAT hypercall |
CVE-2014-1895
|
| VCID-uqsf-872r-a3dc | Memory accessible by 64-bit PV guests under live migration |
CVE-2013-4356
|
| VCID-uyct-zk7n-sbcz | QEMU heap overflow flaw while processing certain ATAPI commands. |
CVE-2015-5154
|
| VCID-ya58-78es-d7bn | qemu incautious about shared ring processing |
CVE-2016-9381
XSA-197 |
| VCID-z61v-ubkc-dbdt | QEMU leak of uninitialized heap memory in rtl8139 device model |
CVE-2015-5165
|
| VCID-zcna-d2sr-97dk | Information leak through outs instruction emulation |
CVE-2013-4368
|