Search for packages
| purl | pkg:ebuild/app-emulation/xen@4.17.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-36dt-1x7b-wqaa | Linux: buffer overrun in netback due to unusual packet |
CVE-2023-34319
|
| VCID-3bw4-631f-e7h6 | arm32: The cache may not be properly cleaned/invalidated |
CVE-2023-34321
XSA-437 |
| VCID-3vdg-5g64-wkbt | x86: shadow stack vs exceptions from emulation stubs |
CVE-2023-46841
XSA-451 |
| VCID-4rmg-db7g-u3hs | pci: phantom functions assigned to incorrect contexts |
CVE-2023-46839
XSA-449 |
| VCID-5ktg-bhh1-ubbz | arm: Guests can trigger a deadlock on Cortex-A77 |
CVE-2023-34320
XSA-436 |
| VCID-6dax-cddv-7bbs | x86/AMD: Debug Mask handling |
CVE-2023-34328
XSA-444 |
| VCID-6jqj-2qwn-8qd9 | x86/AMD: Debug Mask handling |
CVE-2023-34327
|
| VCID-8k1q-b2kj-w7hh | Multiple vulnerabilities in libfsimage disk handling |
CVE-2023-34325
XSA-443 |
| VCID-97zm-r9b6-uqdu | xenstored: A transaction conflict can crash C Xenstored |
CVE-2023-34323
XSA-440 |
| VCID-ahxj-272k-gbfs | VT-d: Failure to quarantine devices in !HVM builds |
CVE-2023-46840
XSA-450 |
| VCID-b57c-x3pw-7fb7 | top-level shadow reference dropped too early for 64-bit PV guests |
CVE-2023-34322
XSA-438 |
| VCID-bhdk-jmss-4qc8 | x86: BTC/SRSO fixes not fully effective |
CVE-2023-46836
XSA-446 |
| VCID-byu1-7n9c-5fes | GhostRace: Speculative Race Conditions |
CVE-2024-2193
XSA-453 |
| VCID-js8w-3shz-xfan | Multiple vulnerabilities in libfsimage disk handling |
CVE-2022-4949
|
| VCID-jz96-yhvb-rfhr | Possible deadlock in Linux kernel event handling |
CVE-2023-34324
|
| VCID-p2fk-8snj-x7dy | x86: Register File Data Sampling |
CVE-2023-28746
XSA-452 |
| VCID-rk2f-yqbb-nyd2 | arm32: The cache may not be properly cleaned/invalidated (take two) |
CVE-2023-46837
XSA-447 |
| VCID-rt5n-e4wq-p3gh | x86 HVM hypercalls may trigger Xen bug check |
CVE-2023-46842
XSA-454 |
| VCID-wd4s-jxuf-skbp | x86/AMD: mismatch in IOMMU quarantine page table levels |
CVE-2023-46835
XSA-445 |
| VCID-wq5x-ptkj-cyaz | Mishandling of guest SSBD selection on AMD hardware |
CVE-2022-42336
XSA-431 |
| VCID-z9rm-9p2q-wfag | x86: Incorrect logic for BTC/SRSO mitigations |
CVE-2024-31142
XSA-455 |
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2026-04-01T13:02:36.987462+00:00 | Gentoo Importer | Fixing | VCID-z9rm-9p2q-wfag | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.977204+00:00 | Gentoo Importer | Fixing | VCID-byu1-7n9c-5fes | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.965689+00:00 | Gentoo Importer | Fixing | VCID-rt5n-e4wq-p3gh | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.956037+00:00 | Gentoo Importer | Fixing | VCID-3vdg-5g64-wkbt | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.947349+00:00 | Gentoo Importer | Fixing | VCID-ahxj-272k-gbfs | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.936647+00:00 | Gentoo Importer | Fixing | VCID-4rmg-db7g-u3hs | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.925977+00:00 | Gentoo Importer | Fixing | VCID-rk2f-yqbb-nyd2 | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.916891+00:00 | Gentoo Importer | Fixing | VCID-bhdk-jmss-4qc8 | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.907213+00:00 | Gentoo Importer | Fixing | VCID-wd4s-jxuf-skbp | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.897511+00:00 | Gentoo Importer | Fixing | VCID-6dax-cddv-7bbs | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.888076+00:00 | Gentoo Importer | Fixing | VCID-6jqj-2qwn-8qd9 | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.877775+00:00 | Gentoo Importer | Fixing | VCID-8k1q-b2kj-w7hh | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.867732+00:00 | Gentoo Importer | Fixing | VCID-jz96-yhvb-rfhr | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.857965+00:00 | Gentoo Importer | Fixing | VCID-97zm-r9b6-uqdu | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.847533+00:00 | Gentoo Importer | Fixing | VCID-b57c-x3pw-7fb7 | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.837991+00:00 | Gentoo Importer | Fixing | VCID-3bw4-631f-e7h6 | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.827190+00:00 | Gentoo Importer | Fixing | VCID-5ktg-bhh1-ubbz | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.817282+00:00 | Gentoo Importer | Fixing | VCID-36dt-1x7b-wqaa | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.808064+00:00 | Gentoo Importer | Fixing | VCID-p2fk-8snj-x7dy | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.797756+00:00 | Gentoo Importer | Fixing | VCID-wq5x-ptkj-cyaz | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |
| 2026-04-01T13:02:36.788559+00:00 | Gentoo Importer | Fixing | VCID-js8w-3shz-xfan | https://security.gentoo.org/glsa/202409-10 | 38.0.0 |