Xen

Xen

476 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.88%
  • Published 19.11.2014 18:59:10
  • Last modified 12.04.2025 10:46:40

The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation ser...

  • EPSS 0.16%
  • Published 26.10.2014 20:55:03
  • Last modified 12.04.2025 10:46:40

Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit ...

  • EPSS 0.91%
  • Published 02.10.2014 14:55:05
  • Last modified 12.04.2025 10:46:40

Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.

  • EPSS 0.78%
  • Published 02.10.2014 14:55:05
  • Last modified 12.04.2025 10:46:40

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges ...

  • EPSS 0.8%
  • Published 02.10.2014 14:55:05
  • Last modified 12.04.2025 10:46:40

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of servi...

  • EPSS 2.55%
  • Published 02.10.2014 14:55:05
  • Last modified 12.04.2025 10:46:40

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other gues...

  • EPSS 0.21%
  • Published 29.08.2014 16:55:11
  • Last modified 12.04.2025 10:46:40

Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.

  • EPSS 0.07%
  • Published 22.08.2014 14:55:08
  • Last modified 12.04.2025 10:46:40

Certain MMU virtualization operations in Xen 4.2.x through 4.4.x before the xsa97-hap patch, when using Hardware Assisted Paging (HAP), are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking thes...

  • EPSS 0.07%
  • Published 22.08.2014 14:55:08
  • Last modified 12.04.2025 10:46:40

Certain MMU virtualization operations in Xen 4.2.x through 4.4.x, when using shadow pagetables, are not preemptible, which allows local HVM guest to cause a denial of service (vcpu consumption) by invoking these operations, which process every page a...

  • EPSS 0.17%
  • Published 09.07.2014 14:55:03
  • Last modified 12.04.2025 10:46:40

The alloc_domain_struct function in arch/arm/domain.c in Xen 4.4.x, when running on an ARM platform, does not properly initialize the structure containing the grant table pages for a domain, which allows local guest administrators to obtain sensitive...