The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Citrix Hypervisor

Intel Processors: information disclosure via Special Register Buffer Data Sampling
An attacker can bypass access restrictions to data via Special Register Buffer Data Sampling of Intel Processors, in order to obtain sensitive information...
CERTFR-2020-AVI-351, CERTFR-2020-AVI-352, CERTFR-2020-AVI-353, CERTFR-2020-AVI-356, CERTFR-2020-AVI-368, CERTFR-2020-AVI-376, CTX275165, CVE-2020-0543, DLA-2241-1, DLA-2241-2, DLA-2242-1, DLA-2248-1, DSA-4698-1, DSA-4699-1, DSA-4701-1, FEDORA-2020-11ddbfbdf0, FEDORA-2020-3364913ace, FEDORA-2020-e47d28bc2b, FEDORA-2020-e49a911382, FEDORA-2020-e8835a5f8e, HPESBHF04001, INTEL-SA-00320, openSUSE-SU-2020:0791-1, openSUSE-SU-2020:0801-1, openSUSE-SU-2020:0818-1, RHSA-2020:2431-01, RHSA-2020:2432-01, RHSA-2020:2433-01, RHSA-2020:2677-01, RHSA-2020:2679-01, RHSA-2020:2680-01, RHSA-2020:2706-01, RHSA-2020:2707-01, RHSA-2020:2757-01, RHSA-2020:2758-01, RHSA-2020:2771-01, SSA:2020-163-01, SUSE-SU-2020:14393-1, SUSE-SU-2020:14394-1, SUSE-SU-2020:1599-1, SUSE-SU-2020:1630-1, SUSE-SU-2020:1632-1, SUSE-SU-2020:1633-1, SUSE-SU-2020:1634-1, SUSE-SU-2020:1663-1, USN-4385-1, USN-4385-2, USN-4387-1, USN-4388-1, USN-4389-1, USN-4390-1, USN-4391-1, USN-4392-1, USN-4393-1, VIGILANCE-VUL-32486, XSA-320
Xen: denial of service via GNTTABOP_copy
An attacker, inside a guest system, can trigger a fatal error via GNTTABOP_copy() of Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-205, CERTFR-2020-AVI-213, CTX270837, CVE-2020-11742, FEDORA-2020-295ed0b1e0, FEDORA-2020-cbc3149753, openSUSE-SU-2020:0599-1, SUSE-SU-2020:1124-1, SUSE-SU-2020:1138-1, SUSE-SU-2020:1139-1, SUSE-SU-2020:1630-1, SUSE-SU-2020:1634-1, VIGILANCE-VUL-32011, XSA-318
Xen: denial of service via GNTTABOP_map_grant
An attacker, inside a guest system, can trigger a fatal error via GNTTABOP_map_grant() of Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-205, CERTFR-2020-AVI-213, CTX270837, CVE-2020-11743, FEDORA-2020-295ed0b1e0, FEDORA-2020-cbc3149753, openSUSE-SU-2020:0599-1, SUSE-SU-2020:1124-1, SUSE-SU-2020:1138-1, SUSE-SU-2020:1139-1, SUSE-SU-2020:1634-1, VIGILANCE-VUL-32010, XSA-316
Xen: information disclosure via xenoprof
An attacker, inside a guest system, can bypass access restrictions to data via xenoprof of Xen, in order to obtain sensitive information on the host system...
CERTFR-2020-AVI-205, CERTFR-2020-AVI-213, CTX270837, CVE-2020-11740, CVE-2020-11741, FEDORA-2020-295ed0b1e0, FEDORA-2020-cbc3149753, openSUSE-SU-2020:0599-1, SUSE-SU-2020:1124-1, SUSE-SU-2020:1138-1, SUSE-SU-2020:1139-1, SUSE-SU-2020:1630-1, SUSE-SU-2020:1634-1, VIGILANCE-VUL-32008, XSA-313
Xen: memory corruption via AMD IOMMU Pagetables Dynamic Height
An attacker, inside a guest system, can trigger a memory corruption via AMD IOMMU Pagetables Dynamic Height of Xen, in order to trigger a denial of service, and possibly to run code on the host system...
CERTFR-2019-AVI-628, CERTFR-2019-AVI-630, CTX266932, CVE-2019-19577, DSA-4602-1, FEDORA-2019-2e12bd3a9a, openSUSE-SU-2020:0011-1, SUSE-SU-2019:3296-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3309-1, SUSE-SU-2019:3310-1, SUSE-SU-2019:3338-1, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, SUSE-SU-2020:1630-1, VIGILANCE-VUL-31127, XSA-311
Xen: privilege escalation via Restartable PV Type Change
An attacker, inside a guest system, can bypass restrictions via Restartable PV Type Change of Xen, in order to escalate his privileges on the host system...
CERTFR-2019-AVI-628, CERTFR-2019-AVI-630, CTX266932, CVE-2019-19580, DSA-4602-1, FEDORA-2019-2e12bd3a9a, openSUSE-SU-2020:0011-1, SUSE-SU-2019:3296-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3309-1, SUSE-SU-2019:3310-1, SUSE-SU-2019:3338-1, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, SUSE-SU-2020:1630-1, VIGILANCE-VUL-31126, XSA-310
Xen: denial of service via Debug Exceptions Blocked States
An attacker can trigger a fatal error via Debug Exceptions Blocked States of Xen, in order to trigger a denial of service...
CERTFR-2019-AVI-628, CERTFR-2019-AVI-630, CTX266932, CVE-2019-19583, DSA-4602-1, FEDORA-2019-2e12bd3a9a, openSUSE-SU-2020:0011-1, SUSE-SU-2019:3296-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3309-1, SUSE-SU-2019:3310-1, SUSE-SU-2019:3338-1, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, SUSE-SU-2020:1630-1, VIGILANCE-VUL-31124, XSA-308
Intel Processors: information disclosure via TSX Asynchronous Abort
An attacker can bypass access restrictions to data via TSX Asynchronous Abort of Intel Processors, in order to obtain sensitive information...
6198355, CERTFR-2019-AVI-554, CERTFR-2019-AVI-555, CERTFR-2019-AVI-558, CERTFR-2019-AVI-559, CERTFR-2019-AVI-560, CERTFR-2019-AVI-561, CERTFR-2019-AVI-563, CERTFR-2019-AVI-571, CERTFR-2019-AVI-575, CERTFR-2019-AVI-612, CERTFR-2019-AVI-635, CERTFR-2020-AVI-029, CERTFR-2020-AVI-056, CTX263684, CVE-2019-11135, DLA-1989-1, DLA-1990-1, DLA-2051-1, DSA-2020-062, DSA-4564-1, DSA-4565-1, DSA-4565-2, DSA-4602-1, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, FreeBSD-SA-19:26.mcu, HPESBHF03968, INTEL-SA-00270, openSUSE-SU-2019:2503-1, openSUSE-SU-2019:2504-1, openSUSE-SU-2019:2505-1, openSUSE-SU-2019:2506-1, openSUSE-SU-2019:2507-1, openSUSE-SU-2019:2509-1, openSUSE-SU-2019:2510-1, openSUSE-SU-2019:2527-1, openSUSE-SU-2019:2528-1, openSUSE-SU-2019:2620-1, openSUSE-SU-2019:2631-1, openSUSE-SU-2019:2710-1, RHSA-2019:3832-01, RHSA-2019:3833-01, RHSA-2019:3834-01, RHSA-2019:3835-01, RHSA-2019:3836-01, RHSA-2019:3837-01, RHSA-2019:3838-01, RHSA-2019:3839-01, RHSA-2019:3840-01, RHSA-2019:3841-01, RHSA-2019:3842-01, RHSA-2019:3843-01, RHSA-2019:3844-01, RHSA-2019:3936-01, RHSA-2020:0026-01, RHSA-2020:0028-01, RHSA-2020:0204-01, RHSA-2020:0279-01, RHSA-2020:0366-01, RHSA-2020:0555-01, RHSA-2020:0666-01, SB10306, SSA:2019-320-01, SUSE-SU-2019:14217-1, SUSE-SU-2019:14218-1, SUSE-SU-2019:14220-1, SUSE-SU-2019:2946-1, SUSE-SU-2019:2947-1, SUSE-SU-2019:2948-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2950-1, SUSE-SU-2019:2951-1, SUSE-SU-2019:2952-1, SUSE-SU-2019:2953-1, SUSE-SU-2019:2954-1, SUSE-SU-2019:2955-1, SUSE-SU-2019:2956-1, SUSE-SU-2019:2957-1, SUSE-SU-2019:2958-1, SUSE-SU-2019:2959-1, SUSE-SU-2019:2960-1, SUSE-SU-2019:2961-1, SUSE-SU-2019:2962-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:2986-1, SUSE-SU-2019:2987-1, SUSE-SU-2019:2988-1, SUSE-SU-2019:3091-1, SUSE-SU-2019:3200-1, SUSE-SU-2019:3294-1, SUSE-SU-2019:3295-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3340-1, SUSE-SU-2019:3348-1, SUSE-SU-2020:0093-1, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, USN-4182-1, USN-4182-2, USN-4182-3, USN-4182-4, USN-4183-1, USN-4183-2, USN-4184-1, USN-4184-2, USN-4185-1, USN-4185-2, USN-4185-3, USN-4186-1, USN-4186-2, USN-4186-3, USN-4187-1, USN-4188-1, VIGILANCE-VUL-30847, VMSA-2019-0020, XSA-305
Intel Processors: denial of service via Machine Check Error On Page Size Change
An attacker, inside a guest system, can trigger a fatal error via Machine Check Error On Page Size Change of Intel Processors, in order to trigger a denial of service on the host system...
CERTFR-2019-AVI-554, CERTFR-2019-AVI-555, CERTFR-2019-AVI-558, CERTFR-2019-AVI-559, CERTFR-2019-AVI-560, CERTFR-2019-AVI-561, CERTFR-2019-AVI-563, CERTFR-2019-AVI-571, CERTFR-2019-AVI-575, CERTFR-2019-AVI-635, CERTFR-2020-AVI-029, CERTFR-2020-AVI-056, CTX263684, CVE-2018-12207, DLA-1990-1, DSA-4564-1, DSA-4566-1, DSA-4602-1, FEDORA-2019-1689d3fe07, FEDORA-2019-68d7f68507, FEDORA-2019-7a3fc17778, FreeBSD-SA-19:25.mcepsc, INTEL-SA-00210, K17269881, openSUSE-SU-2019:2503-1, openSUSE-SU-2019:2505-1, openSUSE-SU-2019:2506-1, openSUSE-SU-2019:2507-1, openSUSE-SU-2019:2510-1, openSUSE-SU-2019:2710-1, RHSA-2019:3832-01, RHSA-2019:3833-01, RHSA-2019:3834-01, RHSA-2019:3835-01, RHSA-2019:3836-01, RHSA-2019:3837-01, RHSA-2019:3838-01, RHSA-2019:3839-01, RHSA-2019:3840-01, RHSA-2019:3841-01, RHSA-2019:3842-01, RHSA-2019:3843-01, RHSA-2019:3844-01, RHSA-2019:3936-01, RHSA-2020:0026-01, RHSA-2020:0028-01, RHSA-2020:0204-01, SUSE-SU-2019:14218-1, SUSE-SU-2019:2946-1, SUSE-SU-2019:2947-1, SUSE-SU-2019:2948-1, SUSE-SU-2019:2949-1, SUSE-SU-2019:2950-1, SUSE-SU-2019:2951-1, SUSE-SU-2019:2952-1, SUSE-SU-2019:2953-1, SUSE-SU-2019:2954-1, SUSE-SU-2019:2955-1, SUSE-SU-2019:2956-1, SUSE-SU-2019:2960-1, SUSE-SU-2019:2961-1, SUSE-SU-2019:2962-1, SUSE-SU-2019:2984-1, SUSE-SU-2019:3294-1, SUSE-SU-2019:3295-1, SUSE-SU-2019:3297-1, SUSE-SU-2019:3340-1, SUSE-SU-2019:3348-1, SUSE-SU-2020:0093-1, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, USN-4183-1, USN-4183-2, USN-4184-1, USN-4184-2, USN-4185-1, USN-4185-2, USN-4185-3, USN-4186-1, USN-4186-2, USN-4186-3, VIGILANCE-VUL-30843, VMSA-2019-0020, XSA-304
Xen: privilege escalation via Restartable PV Type Change
An attacker, inside a guest system, can bypass restrictions via Restartable PV Type Change of Xen, in order to escalate his privileges on the host system...
CERTFR-2019-AVI-541, CERTFR-2019-AVI-543, CTX263477, CVE-2019-18421, DSA-4602-1, FEDORA-2019-865bb16900, FEDORA-2019-cbb732f760, openSUSE-SU-2019:2506-1, SUSE-SU-2019:2960-1, SUSE-SU-2019:2961-1, SUSE-SU-2019:2962-1, SUSE-SU-2019:3297-1, SUSE-SU-2020:0334-1, SUSE-SU-2020:0388-1, VIGILANCE-VUL-30763, XSA-299
Our database contains other pages. You can request a free trial to read them.

Display information about Citrix Hypervisor: