Xen

Xen

479 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier....

  • EPSS 0.11%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been ...

  • EPSS 0.11%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profi...

  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some...

  • EPSS 2.25%
  • Veröffentlicht 31.01.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 02:35:42

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecifie...

  • EPSS 0.12%
  • Veröffentlicht 11.12.2019 18:16:19
  • Zuletzt bearbeitet 21.11.2024 04:34:58

An issue was discovered in Xen through 4.12.x allowing x86 AMD HVM guest OS users to cause a denial of service or possibly gain privileges by triggering data-structure access during pagetable-height updates. When running on AMD systems with an IOMMU,...

  • EPSS 0.13%
  • Veröffentlicht 11.12.2019 18:16:19
  • Zuletzt bearbeitet 21.11.2024 04:34:58

An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to cause a denial of service via degenerate chains of linear pagetables, because of an incorrect fix for CVE-2017-15595. "Linear pagetables" is a technique which involves ei...

  • EPSS 0.66%
  • Veröffentlicht 11.12.2019 18:16:19
  • Zuletzt bearbeitet 21.11.2024 04:34:59

An issue was discovered in Xen through 4.12.x allowing x86 PV guest OS users to gain host OS privileges by leveraging race conditions in pagetable promotion and demotion operations, because of an incomplete fix for CVE-2019-18421. XSA-299 addressed s...

  • EPSS 0.1%
  • Veröffentlicht 11.12.2019 18:16:19
  • Zuletzt bearbeitet 21.11.2024 04:34:59

An issue was discovered in Xen through 4.12.x allowing 32-bit Arm guest OS users to cause a denial of service (out-of-bounds access) because certain bit iteration is mishandled. In a number of places bitmaps are being used by the hypervisor to track ...