Xen

Xen

476 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Published 28.07.2018 18:29:00
  • Last modified 21.11.2024 03:49:34

An issue was discovered in the Linux kernel through 4.17.11, as used in Xen through 4.11.x. The xen_failsafe_callback entry point in arch/x86/entry/entry_64.S does not properly maintain RBX, which allows local users to cause a denial of service (unin...

  • EPSS 0.77%
  • Published 27.07.2018 19:29:00
  • Last modified 21.11.2024 03:23:50

Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use t...

  • EPSS 0.39%
  • Published 03.07.2018 01:29:00
  • Last modified 21.11.2024 03:23:50

Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to...

  • EPSS 0.07%
  • Published 02.07.2018 17:29:00
  • Last modified 21.11.2024 03:46:02

An issue was discovered in Xen through 4.10.x. Certain PV MMU operations may take a long time to process. For that reason Xen explicitly checks for the need to preempt the current vCPU at certain points. A few rarely taken code paths did bypass such ...

  • EPSS 2.92%
  • Published 02.07.2018 17:29:00
  • Last modified 21.11.2024 03:46:03

An issue was discovered in Xen 4.7 through 4.10.x. libxl fails to pass the readonly flag to qemu when setting up a SCSI disk, due to what was probably an erroneous merge conflict resolution. Malicious guest administrators or (in some situations) user...

  • EPSS 0.07%
  • Published 02.07.2018 17:29:00
  • Last modified 21.11.2024 03:46:03

An issue was discovered in Xen through 4.10.x. One of the fixes in XSA-260 added some safety checks to help prevent Xen livelocking with debug exceptions. Unfortunately, due to an oversight, at least one of these safety checks can be triggered by a g...

  • EPSS 0.07%
  • Published 10.05.2018 23:29:00
  • Last modified 21.11.2024 03:42:26

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to...

  • EPSS 0.07%
  • Published 10.05.2018 22:29:00
  • Last modified 21.11.2024 03:42:26

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (host OS infinite loop) in situations where a QEMU device model attempts to make invalid transitions between states of a request.

Exploit
  • EPSS 23.21%
  • Published 08.05.2018 18:29:00
  • Last modified 21.11.2024 04:14:33

A statement in the System Programming Guide of the Intel 64 and IA-32 Architectures Software Developer's Manual (SDM) was mishandled in the development of some or all operating-system kernels, resulting in unexpected behavior for #DB exceptions that ...

  • EPSS 0.11%
  • Published 27.04.2018 15:29:00
  • Last modified 21.11.2024 03:41:22

An issue was discovered in Xen through 4.10.x allowing x86 PV guest OS users to cause a denial of service (out-of-bounds zero write and hypervisor crash) via unexpected INT 80 processing, because of an incorrect fix for CVE-2017-5754.