Xen

Xen

483 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 07.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing x86 Intel HVM guest OS users to cause a host OS denial of service or possibly gain privileges because of insufficient cache write-back under VT-d. When page tables are shared between IOMMU and C...

  • EPSS 0.06%
  • Veröffentlicht 07.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a host OS crash because of incorrect error handling in event-channel port allocation. The allocation of an event-channel port may fail for multiple reasons: (1) port is a...

  • EPSS 0.06%
  • Veröffentlicht 07.07.2020 13:15:10
  • Zuletzt bearbeitet 21.11.2024 05:05:45

An issue was discovered in Xen through 4.13.x, allowing Intel guest OS users to gain privileges or cause a denial of service because of non-atomic modification of a live EPT PTE. When mapping guest EPT (nested paging) tables, Xen would in some circum...

  • EPSS 0.08%
  • Veröffentlicht 07.07.2020 13:15:09
  • Zuletzt bearbeitet 21.11.2024 05:05:44

An issue was discovered in Xen through 4.13.x, allowing x86 HVM guest OS users to cause a hypervisor crash. An inverted conditional in x86 HVM guests' dirty video RAM tracking code allows such guests to make Xen de-reference a pointer guaranteed to p...

  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service or possibly gain privileges because of missing memory barriers in read-write unlock paths. The read-write unlock paths don't contain a memory barrier....

  • EPSS 0.11%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (without active profiling) to obtain sensitive information about other guests. Unprivileged guests can request to map xenoprof buffers, even if profiling has not been ...

  • EPSS 0.11%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in xenoprof in Xen through 4.13.x, allowing guest OS users (with active profiling) to obtain sensitive information about other guests, cause a denial of service, or possibly gain privileges. For guests for which "active" profi...

  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of bad continuation handling in GNTTABOP_copy. Grant table operations are expected to return 0 for success, and a negative number for errors. ...

Exploit
  • EPSS 0.09%
  • Veröffentlicht 14.04.2020 13:15:12
  • Zuletzt bearbeitet 21.11.2024 04:58:31

An issue was discovered in Xen through 4.13.x, allowing guest OS users to cause a denial of service because of a bad error path in GNTTABOP_map_grant. Grant table operations are expected to return 0 for success, and a negative number for errors. Some...

  • EPSS 2.25%
  • Veröffentlicht 31.01.2020 22:15:11
  • Zuletzt bearbeitet 21.11.2024 02:35:42

The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecifie...