Xen

Xen

19 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 20.03.2024 11:15:08
  • Last modified 21.11.2024 20:15:36

PCI devices can make use of a functionality called phantom functions, that when enabled allows the device to generate requests using the IDs of functions that are otherwise unpopulated. This allows a device to extend the number of outstanding reques...

  • EPSS 1.75%
  • Published 15.03.2024 18:15:08
  • Last modified 30.04.2025 23:16:01

A Speculative Race Condition (SRC) vulnerability that impacts modern CPU architectures supporting speculative execution (related to Spectre V1) has been disclosed. An unauthenticated attacker can exploit this vulnerability to disclose arbitrary data ...

  • EPSS 0.16%
  • Published 26.10.2014 20:55:03
  • Last modified 12.04.2025 10:46:40

Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit ...

  • EPSS 0.08%
  • Published 07.01.2014 19:55:05
  • Last modified 11.04.2025 00:51:21

The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.

Exploit
  • EPSS 1.42%
  • Published 05.10.2009 19:30:00
  • Last modified 09.04.2025 00:30:58

The pyGrub boot loader in Xen 3.0.3, 3.3.0, and Xen-3.3.1 does not support the password option in grub.conf for para-virtualized guests, which allows attackers with access to the para-virtualized guest console to boot the guest or modify the guest's ...

Exploit
  • EPSS 0.67%
  • Published 22.05.2009 11:52:40
  • Last modified 09.04.2025 00:30:58

The hypervisor_callback function in Xen, possibly before 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a s...

  • EPSS 0.03%
  • Published 07.11.2008 19:36:23
  • Last modified 09.04.2025 00:30:58

qemu-dm.debug in Xen 3.2.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/args temporary file.

  • EPSS 1.61%
  • Published 14.08.2008 22:41:00
  • Last modified 09.04.2025 00:30:58

Heap-based buffer overflow in the flask_security_label function in Xen 3.3, when compiled with the XSM:FLASK module, allows unprivileged domain users (domU) to execute arbitrary code via the flask_op hypercall.

Exploit
  • EPSS 0.11%
  • Published 17.12.2007 23:46:00
  • Last modified 09.04.2025 00:30:58

The copy_to_user function in the PAL emulation functionality for Xen 3.1.2 and earlier, when running on ia64 systems, allows HVM guest users to access arbitrary physical memory by triggering certain mapping operations.