The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Citrix Hypervisor

Intel Processors: information disclosure
An attacker can bypass access restrictions to data of Intel Processors, in order to obtain sensitive information...
CERTFR-2020-AVI-734, CERTFR-2020-AVI-741, CERTFR-2020-AVI-746, CTX285937, CVE-2020-8696, CVE-2020-8698, FEDORA-2020-14fda1bf85, FEDORA-2020-2c8824c6b1, FEDORA-2020-d5941ea479, HPESBHF04057, INTEL-SA-00381, openSUSE-SU-2020:1915-1, openSUSE-SU-2020:1923-1, openSUSE-SU-2020:2075-1, RHSA-2020:5083-01, RHSA-2020:5084-01, RHSA-2020:5085-01, RHSA-2020:5181-01, RHSA-2020:5182-01, RHSA-2020:5183-01, RHSA-2020:5184-01, RHSA-2020:5185-01, RHSA-2020:5186-01, RHSA-2020:5188-01, RHSA-2020:5189-01, RHSA-2020:5190-01, SUSE-SU-2020:14540-1, SUSE-SU-2020:14546-1, SUSE-SU-2020:3271-1, SUSE-SU-2020:3274-1, SUSE-SU-2020:3275-1, SUSE-SU-2020:3276-1, SUSE-SU-2020:3279-1, SUSE-SU-2020:3372-1, SUSE-SU-2020:3373-1, SUSE-SU-2020:3374-1, SUSE-SU-2020:3457-1, SUSE-SU-2020:3514-1, USN-4628-1, USN-4628-2, VIGILANCE-VUL-33881
Xen: denial of service via Linux High Frequency Events
An attacker, inside a guest system, can trigger a fatal error via Linux High Frequency Events of Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-657, CERTFR-2020-AVI-693, CERTFR-2020-AVI-741, CERTFR-2020-AVI-764, CERTFR-2020-AVI-769, CTX284874, CVE-2020-27673, openSUSE-SU-2020:1783-1, openSUSE-SU-2020:1844-1, SUSE-SU-2020:3049-1, SUSE-SU-2020:3050-1, SUSE-SU-2020:3051-1, SUSE-SU-2020:3052-1, SUSE-SU-2020:3088-1, SUSE-SU-2020:3272-1, SUSE-SU-2020:3281-1, SUSE-SU-2020:3491-1, SUSE-SU-2020:3532-1, SUSE-SU-2020:3544-1, VIGILANCE-VUL-33630, XSA-332
Xen: denial of service via Linux Event Handler Race
An attacker, inside a guest system, can trigger a fatal error via Linux Event Handler Race of Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-657, CERTFR-2020-AVI-693, CERTFR-2020-AVI-741, CERTFR-2020-AVI-764, CERTFR-2020-AVI-769, CTX284874, CVE-2020-27675, FEDORA-2020-09e4d062fe, FEDORA-2020-474d747b60, FEDORA-2020-920a258c79, SUSE-SU-2020:3272-1, SUSE-SU-2020:3281-1, SUSE-SU-2020:3491-1, SUSE-SU-2020:3532-1, SUSE-SU-2020:3544-1, VIGILANCE-VUL-33629, XSA-331
Xen: denial of service
An attacker, inside a guest system, can trigger a fatal error of Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-593, CERTFR-2020-AVI-594, CTX282314, CVE-2020-25601, DSA-4769-1, FEDORA-2020-d46fe34349, FEDORA-2020-f668e579be, openSUSE-SU-2020:1608-1, SUSE-SU-2020:14521-1, SUSE-SU-2020:2786-1, SUSE-SU-2020:2787-1, SUSE-SU-2020:2788-1, SUSE-SU-2020:2789-1, SUSE-SU-2020:2790-1, SUSE-SU-2020:2791-1, SUSE-SU-2020:2822-1, VIGILANCE-VUL-33394, XSA-344
Xen: privilege escalation via evtchn_reset
An attacker, inside a guest system, can bypass restrictions via evtchn_reset() of Xen, in order to escalate his privileges on the host system...
CERTFR-2020-AVI-593, CERTFR-2020-AVI-594, CTX282314, CVE-2020-25599, DSA-4769-1, FEDORA-2020-d46fe34349, FEDORA-2020-f668e579be, openSUSE-SU-2020:1608-1, SUSE-SU-2020:2786-1, SUSE-SU-2020:2787-1, SUSE-SU-2020:2788-1, SUSE-SU-2020:2789-1, SUSE-SU-2020:2790-1, SUSE-SU-2020:2791-1, SUSE-SU-2020:2822-1, VIGILANCE-VUL-33393, XSA-343
Xen: denial of service via channel limits
An attacker, inside a guest 32 bits system, can trigger a memory corruption via the channel limits in Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-593, CERTFR-2020-AVI-594, CTX282314, CVE-2020-25600, DSA-4769-1, FEDORA-2020-d46fe34349, FEDORA-2020-f668e579be, openSUSE-SU-2020:1608-1, SUSE-SU-2020:14521-1, SUSE-SU-2020:2786-1, SUSE-SU-2020:2787-1, SUSE-SU-2020:2788-1, SUSE-SU-2020:2789-1, SUSE-SU-2020:2790-1, SUSE-SU-2020:2791-1, SUSE-SU-2020:2822-1, VIGILANCE-VUL-33392, XSA-342
Xen: denial of service via the synchronization of memory access
An attacker, inside a guest system, can trigger a fatal error in the synchronization of memory access in Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-593, CERTFR-2020-AVI-594, CTX282314, CVE-2020-25603, DSA-4769-1, FEDORA-2020-d46fe34349, FEDORA-2020-f668e579be, openSUSE-SU-2020:1608-1, SUSE-SU-2020:14521-1, SUSE-SU-2020:2786-1, SUSE-SU-2020:2787-1, SUSE-SU-2020:2788-1, SUSE-SU-2020:2789-1, SUSE-SU-2020:2790-1, SUSE-SU-2020:2791-1, SUSE-SU-2020:2822-1, VIGILANCE-VUL-33391, XSA-340
Xen: denial of service via SYSENTER
An attacker can trigger a fatal error via SYSENTER of Xen, in order to trigger a denial of service...
CERTFR-2020-AVI-593, CERTFR-2020-AVI-594, CTX282314, CVE-2020-25596, DSA-4769-1, FEDORA-2020-d46fe34349, FEDORA-2020-f668e579be, openSUSE-SU-2020:1608-1, SUSE-SU-2020:14521-1, SUSE-SU-2020:2786-1, SUSE-SU-2020:2787-1, SUSE-SU-2020:2788-1, SUSE-SU-2020:2789-1, SUSE-SU-2020:2790-1, SUSE-SU-2020:2791-1, SUSE-SU-2020:2822-1, VIGILANCE-VUL-33390, XSA-339
Xen: denial of service via channels
An attacker, inside a guest system, can trigger a fatal error via channel reset in Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-593, CERTFR-2020-AVI-594, CTX282314, CVE-2020-25597, DSA-4769-1, FEDORA-2020-d46fe34349, FEDORA-2020-f668e579be, openSUSE-SU-2020:1608-1, SUSE-SU-2020:14521-1, SUSE-SU-2020:2786-1, SUSE-SU-2020:2787-1, SUSE-SU-2020:2788-1, SUSE-SU-2020:2789-1, SUSE-SU-2020:2790-1, SUSE-SU-2020:2791-1, SUSE-SU-2020:2822-1, VIGILANCE-VUL-33389, XSA-338
Xen: denial of service via PCI
An attacker, inside a guest system, can trigger a fatal error via PCI of Xen, in order to trigger a denial of service on the host system...
CERTFR-2020-AVI-593, CERTFR-2020-AVI-594, CTX282314, CVE-2020-25595, DSA-4769-1, FEDORA-2020-d46fe34349, FEDORA-2020-f668e579be, openSUSE-SU-2020:1608-1, SUSE-SU-2020:14521-1, SUSE-SU-2020:2786-1, SUSE-SU-2020:2787-1, SUSE-SU-2020:2788-1, SUSE-SU-2020:2789-1, SUSE-SU-2020:2790-1, SUSE-SU-2020:2791-1, SUSE-SU-2020:2822-1, VIGILANCE-VUL-33388, XSA-337
Our database contains other pages. You can request a free trial to read them.

Display information about Citrix Hypervisor: