Xen

Xen

476 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.13%
  • Veröffentlicht 23.11.2012 20:55:04
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The (1) memc_save_get_next_page, (2) tmemc_restore_put_page and (3) tmemc_restore_flush_page functions in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 do not check for negative id pools, which allows local guest OS users to cause a denial ...

  • EPSS 0.11%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The set_debugreg hypercall in include/asm-x86/debugreg.h in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when running on x86-64 systems, allows local OS guest users to cause a denial of service (host crash) by writing to the reserve...

  • EPSS 0.08%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The physdev_get_free_pirq hypercall in arch/x86/physdev.c in Xen 4.1.x and Citrix XenServer 6.0.2 and earlier uses the return value of the get_free_pirq function as an array index without checking that the return value indicates an error, which allow...

  • EPSS 0.09%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as...

  • EPSS 0.11%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

(1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer d...

  • EPSS 0.07%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

PHYSDEVOP_map_pirq in Xen 4.1 and 4.2 and Citrix XenServer 6.0.2 and earlier allows local HVM guest OS kernels to cause a denial of service (host crash) and possibly read hypervisor or guest memory via vectors related to a missing range check of map-...

  • EPSS 0.05%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device mode...

  • EPSS 0.08%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The GNTTABOP_swap_grant_ref sub-operation in the grant table hypercall in Xen 4.2 and Citrix XenServer 6.0.2 allows local guest kernels or administrators to cause a denial of service (host crash) and possibly gain privileges via a crafted grant refer...

  • EPSS 0.09%
  • Veröffentlicht 23.11.2012 20:55:03
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The graphical console in Xen 4.0, 4.1 and 4.2 allows local OS guest administrators to obtain sensitive host resource information via the qemu monitor. NOTE: this might be a duplicate of CVE-2007-0998.

  • EPSS 0.11%
  • Veröffentlicht 21.11.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."