Xen

Xen

476 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 28.03.2014 15:55:08
  • Last modified 12.04.2025 10:46:40

The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for 32-bit and 4.1.x through 4.4.x for 64-bit allow local guest administrators to cause a denial of service (CPU consumption) by leveraging access to certain service domains for HVM guests ...

  • EPSS 0.08%
  • Published 14.02.2014 15:55:06
  • Last modified 11.04.2025 00:51:21

Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management f...

  • EPSS 0.18%
  • Published 26.01.2014 16:58:11
  • Last modified 11.04.2025 00:51:21

The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memor...

  • EPSS 3.25%
  • Published 26.01.2014 16:58:11
  • Last modified 11.04.2025 00:51:21

The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service ...

  • EPSS 0.09%
  • Published 19.01.2014 18:55:02
  • Last modified 11.04.2025 00:51:21

The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.

  • EPSS 0.11%
  • Published 07.01.2014 19:55:05
  • Last modified 11.04.2025 00:51:21

Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.

  • EPSS 0.23%
  • Published 07.01.2014 19:55:05
  • Last modified 11.04.2025 00:51:21

The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.

  • EPSS 0.08%
  • Published 07.01.2014 19:55:05
  • Last modified 11.04.2025 00:51:21

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified ...

  • EPSS 0.14%
  • Published 27.12.2013 01:55:05
  • Last modified 11.04.2025 00:51:21

Xen in the Linux kernel, when running a guest on a host without hardware assisted paging (HAP), allows guest users to cause a denial of service (invalid pointer dereference and hypervisor crash) via the SAHF instruction.

  • EPSS 0.33%
  • Published 24.12.2013 19:55:07
  • Last modified 11.04.2025 00:51:21

The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock).