CVE-2015-0268
- EPSS 0.05%
- Veröffentlicht 16.02.2015 15:59:03
- Zuletzt bearbeitet 12.04.2025 10:46:40
The vgic_v2_to_sgi function in arch/arm/vgic-v2.c in Xen 4.5.x, when running on ARM hardware with general interrupt controller (GIC) version 2, allows local guest users to cause a denial of service (host crash) by writing an invalid value to the GICD...
CVE-2015-1563
- EPSS 0.08%
- Veröffentlicht 09.02.2015 11:59:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
The ARM GIC distributor virtualization in Xen 4.4.x and 4.5.x allows local guests to cause a denial of service by causing a large number messages to be logged.
CVE-2014-6268
- EPSS 0.07%
- Veröffentlicht 12.01.2015 15:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
The evtchn_fifo_set_pending function in Xen 4.4.x allows local guest users to cause a denial of service (host crash) via vectors involving an uninitialized FIFO-based event channel control block when (1) binding or (2) moving an event to a different ...
CVE-2015-0361
- EPSS 1.75%
- Veröffentlicht 07.01.2015 19:59:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
Use-after-free vulnerability in Xen 4.2.x, 4.3.x, and 4.4.x allows remote domains to cause a denial of service (system crash) via a crafted hypercall during HVM guest teardown.
CVE-2014-9066
- EPSS 0.04%
- Veröffentlicht 09.12.2014 23:59:09
- Zuletzt bearbeitet 12.04.2025 10:46:40
Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read...
CVE-2014-9065
- EPSS 0.07%
- Veröffentlicht 09.12.2014 23:59:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a dif...
CVE-2014-8867
- EPSS 0.13%
- Veröffentlicht 01.12.2014 15:59:09
- Zuletzt bearbeitet 12.04.2025 10:46:40
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) v...
CVE-2014-8866
- EPSS 0.09%
- Veröffentlicht 01.12.2014 15:59:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of register...
CVE-2014-9030
- EPSS 2.32%
- Veröffentlicht 24.11.2014 15:59:19
- Zuletzt bearbeitet 12.04.2025 10:46:40
The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
CVE-2014-8595
- EPSS 0.07%
- Veröffentlicht 19.11.2014 18:59:11
- Zuletzt bearbeitet 12.04.2025 10:46:40
arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJM...