Debian Xen vulnerabilities

478 known vulnerabilities affecting debian/xen.

Total CVEs
478
CISA KEV
0
Public exploits
10
Exploited in wild
1
Severity breakdown
CRITICAL18HIGH138MEDIUM226LOW96

Vulnerabilities

Page 22 of 24
CVE-2013-4554LOWCVSS 5.22013
CVE-2013-4554 [MEDIUM] CVE-2013-4554: xen - Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (p... Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2013-1917LOWCVSS 1.9fixed in xen 4.1.4-3 (bookworm)2013
CVE-2013-1917 [LOW] CVE-2013-1917: xen - Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the... Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction. Scope: local bookworm: resolved (fixed in 4.1.4-3) bullseye: resolved (fixe
debian
CVE-2013-1920LOWCVSS 4.42013
CVE-2013-1920 [MEDIUM] CVE-2013-1920: xen - Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pres... Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors. Scope: lo
debian
CVE-2013-4375LOWCVSS 2.7fixed in qemu 1.7.0+dfsg-1 (bookworm)2013
CVE-2013-4375 [LOW] CVE-2013-4375: qemu - The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and q... The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors. Scope: local bookworm: resolved (fixed in 1.7.0+dfsg-1) bullseye: resolved (fixed in 1.7.0+dfsg-1) forky: resolved (fixed in 1.7.0+dfsg-1) sid: resolve
debian
CVE-2013-2076LOWCVSS 2.1fixed in xen 4.2.2-1 (bookworm)2013
CVE-2013-2076 [LOW] CVE-2013-2076: xen - Xen 4.0.x, 4.1.x, and 4.2.x, when running on AMD64 processors, only save/restore... Xen 4.0.x, 4.1.x, and 4.2.x, when running on AMD64 processors, only save/restore the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR when an exception is pending, which allows one domain to determine portions of the state of floating point instructions of other domains, which can be leveraged to obtain sensitive information such as cryptographic keys, a similar vulnerabi
debian
CVE-2013-0154LOWCVSS 1.92013
CVE-2013-0154 [LOW] CVE-2013-0154: xen - The get_page_type function in xen/arch/x86/mm.c in Xen 4.2, when debugging is en... The get_page_type function in xen/arch/x86/mm.c in Xen 4.2, when debugging is enabled, allows local PV or HVM guest administrators to cause a denial of service (assertion failure and hypervisor crash) via unspecified vectors related to a hypercall. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2013-1952LOWCVSS 1.9fixed in xen 4.1.4-4 (bookworm)2013
CVE-2013-1952 [LOW] CVE-2013-1952: xen - Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not ... Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors. Scope: local bookworm: resolved (fixed in 4.1.4-4) bullseye: resolved (fi
debian
CVE-2013-4355LOWCVSS 1.5fixed in xen 4.4.0-1 (bookworm)2013
CVE-2013-4355 [LOW] CVE-2013-4355: xen - Xen 4.3.x and earlier does not properly handle certain errors, which allows loca... Xen 4.3.x and earlier does not properly handle certain errors, which allows local HVM guests to obtain hypervisor stack memory via a (1) port or (2) memory mapped I/O write or (3) other unspecified operations related to addresses without associated memory. Scope: local bookworm: resolved (fixed in 4.4.0-1) bullseye: resolved (fixed in 4.4.0-1) forky: resolved (fixed in 4.4
debian
CVE-2013-4416LOWCVSS 5.22013
CVE-2013-4416 [MEDIUM] CVE-2013-4416: xen - The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x a... The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply. Scope: local bookworm: resolved bullseye: resolved forky: resolved sid: resolved trixie: resolved
debian
CVE-2013-2072LOWCVSS 7.4fixed in xen 4.2.2-1 (bookworm)2013
CVE-2013-2072 [HIGH] CVE-2013-2072: xen - Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4... Buffer overflow in the Python bindings for the xc_vcpu_setaffinity call in Xen 4.0.x, 4.1.x, and 4.2.x allows local administrators with permissions to configure VCPU affinity to cause a denial of service (memory corruption and xend toolstack crash) and possibly gain privileges via a crafted cpumap. Scope: local bookworm: resolved (fixed in 4.2.2-1) bullseye: resolved (fix
debian
CVE-2012-6075CRITICALCVSS 9.3fixed in qemu 1.1.2+dfsg-4 (bookworm)2012
CVE-2012-6075 [CRITICAL] CVE-2012-6075: qemu - Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e10... Buffer overflow in the e1000_receive function in the e1000 device driver (hw/e1000.c) in QEMU 1.3.0-rc2 and other versions, when the SBP and LPE flags are disabled, allows remote attackers to cause a denial of service (guest OS crash) and possibly execute arbitrary guest code via a large packet. Scope: local bookworm: resolved (fixed in 1.1.2+dfsg-4) bullseye: resolv
debian
CVE-2012-0217HIGHCVSS 7.2PoCfixed in xen 4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 (bookworm)2012
CVE-2012-0217 [HIGH] CVE-2012-0217: xen - The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in... The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly
debian
CVE-2012-2934HIGHCVSS 7.2fixed in xen 4.1.3~rc1+hg-20120614.a9c0a89c08f2-1 (bookworm)2012
CVE-2012-2934 [HIGH] CVE-2012-2934: xen - Xen 4.0, and 4.1, when running a 64-bit PV guest on "older" AMD CPUs, does not p... Xen 4.0, and 4.1, when running a 64-bit PV guest on "older" AMD CPUs, does not properly protect against a certain AMD processor bug, which allows local guest OS users to cause a denial of service (host hang) via sequential execution of instructions across a non-canonical boundary, a different vulnerability than CVE-2012-0217. Scope: local bookworm: resolved (fixed in 4.1.
debian
CVE-2012-3515HIGHCVSS 7.2fixed in qemu 1.1.2+dfsg-1 (bookworm)2012
CVE-2012-3515 [HIGH] CVE-2012-3515: qemu - Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certai... Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space." Scope: local bookworm: resolved (fixed in 1.1.2+dfsg-1) bullseye: resolved (fixed in 1.1.2+dfsg-1) fork
debian
CVE-2012-4538MEDIUMCVSS 4.9fixed in xen 4.1.3-4 (bookworm)2012
CVE-2012-4538 [MEDIUM] CVE-2012-4538: xen - The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly c... The HVMOP_pagetable_dying hypercall in Xen 4.0, 4.1, and 4.2 does not properly check the pagetable state when running on shadow pagetables, which allows a local HVM guest OS to cause a denial of service (hypervisor crash) via unspecified vectors. Scope: local bookworm: resolved (fixed in 4.1.3-4) bullseye: resolved (fixed in 4.1.3-4) forky: resolved (fixed in 4.1.3-4) s
debian
CVE-2012-3496MEDIUMCVSS 4.7fixed in xen 4.1.3-2 (bookworm)2012
CVE-2012-3496 [MEDIUM] CVE-2012-3496: xen - XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and... XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand. Scope: local bookworm: resolved (fixed in 4.1.3-2) bullseye: resolved (fixed in 4.1.3-2) forky:
debian
CVE-2012-6333MEDIUMCVSS 4.7fixed in xen 4.1.3-8 (bookworm)2012
CVE-2012-6333 [MEDIUM] CVE-2012-6333: xen - Multiple HVM control operations in Xen 3.4 through 4.2 allow local HVM guest OS ... Multiple HVM control operations in Xen 3.4 through 4.2 allow local HVM guest OS administrators to cause a denial of service (physical CPU consumption) via a large input. Scope: local bookworm: resolved (fixed in 4.1.3-8) bullseye: resolved (fixed in 4.1.3-8) forky: resolved (fixed in 4.1.3-8) sid: resolved (fixed in 4.1.3-8) trixie: resolved (fixed in 4.1.3-8)
debian
CVE-2012-3495MEDIUMCVSS 6.1fixed in xen 4.1.3-2 (bookworm)2012
CVE-2012-3495 [MEDIUM] CVE-2012-3495: xen - The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citri... The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allows guest OS users to cause a denial of service (invalid memory write and host crash) and possibly gain privileges via unspe
debian
CVE-2012-5515MEDIUMCVSS 4.7fixed in xen 4.1.3-5 (bookworm)2012
CVE-2012-5515 [MEDIUM] CVE-2012-5515: xen - The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM... The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. Scope: local bookworm: resolved (fixed in 4.1.3-5) bullseye: resolved (fixed in 4.1.3-5) forky: resolved (fixed in 4.1.3-5) sid: re
debian
CVE-2012-5514MEDIUMCVSS 4.7fixed in xen 4.1.3-6 (bookworm)2012
CVE-2012-5514 [MEDIUM] CVE-2012-5514: xen - The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does n... The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors. Scope: local bookworm: resolved (fixed in 4.1.3-6) bullseye: resolved (fixed in 4.1.3-6) forky: resolved (fixed in 4.
debian