Search for packages
| purl | pkg:deb/debian/xen@4.8.0~rc3-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-12wz-93wy-euhs | libxl leak of pv kernel and initrd on error |
CVE-2015-8341
|
| VCID-1ewg-kc47-bucs | XENMEM_exchange error handling issues |
CVE-2015-8340
|
| VCID-2h35-vvte-g7cs | x86: CPU lockup during exception delivery |
CVE-2015-8104
|
| VCID-49x7-nf2n-4ya6 | arm: Host crash caused by VMID exhaustion |
CVE-2016-5242
|
| VCID-5gab-898z-v7h5 | VMX: intercept issue with INVLPG on non-canonical address |
CVE-2016-1571
|
| VCID-7gba-36c6-r7em | PV superpage functionality missing sanity checks |
CVE-2016-1570
|
| VCID-83pg-u792-vkht | XENMEM_exchange error handling issues |
CVE-2015-8339
|
| VCID-8xdy-x7d6-43hk | Unsanitised driver domain input in libxl device handling |
CVE-2016-4963
|
| VCID-9yb3-ge9b-sbe1 | VMX: guest user mode may crash guest with non-canonical RIP |
CVE-2016-2271
|
| VCID-au4w-wt7d-37h4 | information leak in legacy x86 FPU/XMM initialization |
CVE-2015-8555
|
| VCID-dc9p-tdf1-h7ad | x86: CPU lockup during exception delivery |
CVE-2015-5307
|
| VCID-emjs-dbhy-nqdr | x86 software guest page walk PS bit handling flaw |
CVE-2016-4480
|
| VCID-fe96-8s69-37fh | long running memory operations on ARM |
CVE-2015-8338
|
| VCID-fj2r-tp5w-j3dg | x86: unintentional logging upon guest changing callback method |
CVE-2015-8615
|
| VCID-gb8y-jxgr-5qdg | possible memory corruption via failsafe callback |
CVE-2017-8905
XSA-215 |
| VCID-h4hf-xbq6-n7e1 | Unsanitised guest input in libxl device handling code |
CVE-2016-4962
|
| VCID-jfmu-gcux-y3et | x86: inconsistent cachability flags on guest mappings |
CVE-2016-2270
|
| VCID-m5h4-49wd-y7b1 | libxl fails to honour readonly flag on disks with qemu-xen |
CVE-2015-7311
|
| VCID-mmpb-71zs-4fft | printk is not rate-limited in xenmem_add_to_physmap_one |
CVE-2015-6654
|
| VCID-nyst-ybjq-3uet | x86: Missing SMAP whitelisting in 32-bit exception / event delivery |
CVE-2016-6259
XSA-183 |
| VCID-q479-9fry-y7dh | x86: Privilege escalation in PV guests |
CVE-2016-6258
XSA-182 |
| VCID-qtbj-1dcj-ykhz | x86 HVM: Overflow of sh_ctxt->seg_reg[] |
CVE-2016-7094
XSA-187 |
| VCID-srt6-6fge-8qbp | x86 shadow pagetables: address width overflow |
CVE-2016-3960
|
| VCID-t14z-dxet-fyet | broken AMD FPU FIP/FDP/FOP leak workaround |
CVE-2016-3159
|
| VCID-uq8r-gwnd-2fh1 | x86: Disallow L3 recursive pagetable for 32-bit PV guests |
CVE-2016-7092
XSA-185 |
| VCID-us1d-sdm8-sbh6 | paravirtualized drivers incautious about shared memory contents |
CVE-2015-8550
|
| VCID-v25t-h3tp-nffb | broken AMD FPU FIP/FDP/FOP leak workaround |
CVE-2016-3158
|
| VCID-xa1k-c5dm-97am | CR0.TS and CR0.EM not always honored for x86 HVM guests |
CVE-2016-7777
XSA-190 |
| VCID-y22w-wqt3-sues | x86 CMPXCHG8B emulation fails to ignore operand size override |
CVE-2016-9932
XSA-200 |