Debian Xen vulnerabilities
478 known vulnerabilities affecting debian/xen.
Total CVEs
478
CISA KEV
0
Public exploits
10
Exploited in wild
1
Severity breakdown
CRITICAL18HIGH138MEDIUM226LOW96
Vulnerabilities
Page 9 of 24
CVE-2020-29480LOWCVSS 2.3fixed in xen 4.14.0+88-g1d1d1f5391-1 (bookworm)2020
CVE-2020-29480 [LOW] CVE-2020-29480: xen - An issue was discovered in Xen through 4.14.x. Neither xenstore implementation d...
An issue was discovered in Xen through 4.14.x. Neither xenstore implementation does any permission checks when reporting a xenstore watch event. A guest administrator can watch the root xenstored node, which will cause notifications for every created, modified, and deleted key. A guest administrator can also use the special watches, which will cause a notification every
debian
CVE-2019-18425CRITICALCVSS 9.8fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-18425 [CRITICAL] CVE-2019-18425: xen - An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users ...
An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS users to gain guest OS privileges by installing and using descriptors. There is missing descriptor table limit checking in x86 PV emulation. When emulating certain PV guest operations, descriptor table accesses are performed by the emulating code. Such accesses should respect the guest specifi
debian
CVE-2019-17347HIGHCVSS 7.8fixed in xen 4.11.1+92-g6c33308a8d-1 (bookworm)2019
CVE-2019-17347 [HIGH] CVE-2019-17347: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).
Scope: local
bookworm: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
bullseye: resolved (fixed in 4.11.1+92-g6c33308a8d-
debian
CVE-2019-17340HIGHCVSS 8.8fixed in xen 4.11.1+92-g6c33308a8d-1 (bookworm)2019
CVE-2019-17340 [HIGH] CVE-2019-17340: xen - An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cau...
An issue was discovered in Xen through 4.11.x allowing x86 guest OS users to cause a denial of service or gain privileges because grant-table transfer requests are mishandled.
Scope: local
bookworm: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
bullseye: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
forky: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
sid: resolved (fixed in
debian
CVE-2019-17342HIGHCVSS 7.0fixed in xen 4.11.1+92-g6c33308a8d-1 (bookworm)2019
CVE-2019-17342 [HIGH] CVE-2019-17342: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.
Scope: local
bookworm: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
bullseye: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
forky: resolved (fixed in 4.11.1+92-g6c33308a8d
debian
CVE-2019-18422HIGHCVSS 8.8fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-18422 [HIGH] CVE-2019-18422: xen - An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cau...
An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service or gain privileges by leveraging the erroneous enabling of interrupts. Interrupts are unconditionally unmasked in exception handlers. When an exception occurs on an ARM system which is handled without changing processor level, some interrupts are unconditionally enable
debian
CVE-2019-19580HIGHCVSS 7.5fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-19580 [HIGH] CVE-2019-19580: xen - An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed several critical issues in restartable PV type change operations. Despite extensive testing and auditing, some corner cases
debian
CVE-2019-17346HIGHCVSS 8.8fixed in xen 4.11.1+92-g6c33308a8d-1 (bookworm)2019
CVE-2019-17346 [HIGH] CVE-2019-17346: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because of an incompatibility between Process Context Identifiers (PCID) and TLB flushes.
Scope: local
bookworm: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
bullseye: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
forky: resolved (fixed in 4.11.1+92-
debian
CVE-2019-19578HIGHCVSS 8.8fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-19578 [HIGH] CVE-2019-19578: xen - An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves either pointing a pagetable at itself, or to another pagetable of the same or higher level. Xen has limited support for line
debian
CVE-2019-18421HIGHCVSS 7.5fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-18421 [HIGH] CVE-2019-18421: xen - An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations. There are issues with restartable PV type change operations. To avoid using shadow pagetables for PV guests, Xen exposes the actual hardware pagetables to the guest. In order to prevent the
debian
CVE-2019-17341HIGHCVSS 7.8fixed in xen 4.11.1+92-g6c33308a8d-1 (bookworm)2019
CVE-2019-17341 [HIGH] CVE-2019-17341: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.
Scope: local
bookworm: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
bullseye: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
forky: resolved (fixed in 4.11
debian
CVE-2019-19583HIGHCVSS 7.5fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-19583 [HIGH] CVE-2019-19583: xen - An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS user...
An issue was discovered in Xen through 4.12.x allowing x86 HVM/PVH guest OS users to cause a denial of service (guest OS crash) because VMX VMEntry checks mishandle a certain case. Please see XSA-260 for background on the MovSS shadow. Please see XSA-156 for background on the need for #DB interception. The VMX VMEntry checks do not like the exact combination of state wh
debian
CVE-2019-18423HIGHCVSS 8.8fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-18423 [HIGH] CVE-2019-18423: xen - An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cau...
An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service via a XENMEM_add_to_physmap hypercall. p2m->max_mapped_gfn is used by the functions p2m_resolve_translation_fault() and p2m_get_entry() to sanity check guest physical frame. The rest of the code in the two functions will assume that there is a valid root table and chec
debian
CVE-2019-19577HIGHCVSS 7.2fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-19577 [HIGH] CVE-2019-19577: xen - An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS user...
An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU, Xen attempted to dynamically adapt the number of levels of pagetables (the pagetable height) in the IOMMU according to th
debian
CVE-2019-19582MEDIUMCVSS 6.5fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-19582 [MEDIUM] CVE-2019-19582: xen - An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cau...
An issue was discovered in Xen through 4.12.x allowing x86 guest OS users to cause a denial of service (infinite loop) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track certain state. Iteration over all bits involves functions which may misbehave in certain corner cases: On x86 accesses to bitmaps with
debian
CVE-2019-17343MEDIUMCVSS 6.8fixed in xen 4.11.1+92-g6c33308a8d-1 (bookworm)2019
CVE-2019-17343 [MEDIUM] CVE-2019-17343: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains.
Scope: local
bookworm: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
bullseye: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
forky: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
si
debian
CVE-2019-11135MEDIUMCVSS 6.5fixed in intel-microcode 3.20191112.1 (bookworm)2019
CVE-2019-11135 [MEDIUM] CVE-2019-11135: intel-microcode - TSX Asynchronous Abort condition on some CPUs utilizing speculative execution ma...
TSX Asynchronous Abort condition on some CPUs utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access.
Scope: local
bookworm: resolved (fixed in 3.20191112.1)
bullseye: resolved (fixed in 3.20191112.1)
forky: resolved (fixed in 3.20191112.1)
sid: resolved (fixed in 3.
debian
CVE-2019-18424MEDIUMCVSS 6.8fixed in xen 4.11.3+24-g14b62ab3e5-1 (bookworm)2019
CVE-2019-18424 [MEDIUM] CVE-2019-18424: xen - An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS...
An issue was discovered in Xen through 4.12.x allowing attackers to gain host OS privileges via DMA in a situation where an untrusted domain has access to a physical device. This occurs because passed through PCI devices may corrupt host memory after deassignment. When a PCI device is assigned to an untrusted domain, it is possible for that domain to program the devic
debian
CVE-2019-17348MEDIUMCVSS 6.5fixed in xen 4.11.1+92-g6c33308a8d-1 (bookworm)2019
CVE-2019-17348 [MEDIUM] CVE-2019-17348: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching.
Scope: local
bookworm: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
bullseye: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
forky: resolved (fixed in 4.11.1+92-g6
debian
CVE-2019-17344MEDIUMCVSS 6.5fixed in xen 4.11.1+92-g6c33308a8d-1 (bookworm)2019
CVE-2019-17344 [MEDIUM] CVE-2019-17344: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates.
Scope: local
bookworm: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
bullseye: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
forky: resolved (fixed in 4.11.1+92-g6c33308a8d-1)
debian