Xen

Xen

476 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 13.05.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."

  • EPSS 0.1%
  • Veröffentlicht 13.05.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."

  • EPSS 0.08%
  • Veröffentlicht 13.05.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is use...

  • EPSS 0.06%
  • Veröffentlicht 12.04.2013 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-a...

  • EPSS 0.22%
  • Veröffentlicht 07.03.2013 05:04:44
  • Zuletzt bearbeitet 11.04.2025 00:51:21

oxenstored in Xen 4.1.x, Xen 4.2.x, and xen-unstable does not properly consider the state of the Xenstore ring during read operations, which allows guest OS users to cause a denial of service (daemon crash and host-control outage, or memory consumpti...

  • EPSS 0.13%
  • Veröffentlicht 07.03.2013 05:04:42
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings an...

  • EPSS 0.12%
  • Veröffentlicht 14.02.2013 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt...

  • EPSS 0.36%
  • Veröffentlicht 14.02.2013 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an...

  • EPSS 0.05%
  • Veröffentlicht 13.02.2013 01:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Memory leak in Xen 4.2 and unstable allows local HVM guests to cause a denial of service (host memory consumption) by performing nested virtualization in a way that triggers errors that are not properly handled.

  • EPSS 0.09%
  • Veröffentlicht 13.02.2013 01:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of ker...