Search CVE reports
61 – 70 of 156 results
CVE-2013-6400
Medium priorityXen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows...
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-6885
Medium prioritySome fixes available 4 of 5
The microcode on AMD 16h 00h through 0Fh processors does not properly handle the interaction between locked instructions and write-combined memory types, which allows local users to cause a denial of service (system hang) via a...
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-6375
Medium priorityXen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain...
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-4551
Medium priorityXen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash)...
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-4416
Medium prioritySome fixes available 4 of 5
The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply.
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-4494
Medium prioritySome fixes available 4 of 5
Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via...
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-4371
Low priorityUse-after-free vulnerability in the libxl_list_cpupool function in the libxl toolstack library in Xen 4.2.x and 4.3.x, when running “under memory pressure,” returns the original pointer when the realloc function fails, which...
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-4370
Low priorityThe ocaml binding for the xc_vcpu_getaffinity function in Xen 4.2.x and 4.3.x frees certain memory that may still be intended for use, which allows local users to cause a denial of service (heap corruption and crash) and possibly...
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-4369
Low priorityThe xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the ”@” character as the VIF rate configuration.
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |
CVE-2013-4368
Low prioritySome fixes available 4 of 5
The outs instruction emulation in Xen 3.1.x, 4.2.x, 4.3.x, and earlier, when using FS: or GS: segment override, uses an uninitialized variable as a segment base, which allows local 64-bit PV guests to obtain sensitive information...
2 affected packages
xen, xen-3.3
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
xen | — | — | — | — | — |
xen-3.3 | — | — | — | — | — |