Xen

Xen

483 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 02.08.2016 16:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.

  • EPSS 0.14%
  • Veröffentlicht 07.06.2016 14:06:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding r...

  • EPSS 0.05%
  • Veröffentlicht 07.06.2016 14:06:16
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.

  • EPSS 0.09%
  • Veröffentlicht 07.06.2016 14:06:15
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled ar...

  • EPSS 0.03%
  • Veröffentlicht 25.05.2016 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.

  • EPSS 0.52%
  • Veröffentlicht 18.05.2016 14:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a c...

  • EPSS 0.08%
  • Veröffentlicht 19.04.2016 14:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.

  • EPSS 0.13%
  • Veröffentlicht 15.04.2016 14:59:14
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.

  • EPSS 0.06%
  • Veröffentlicht 14.04.2016 14:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable...

  • EPSS 15.96%
  • Veröffentlicht 14.04.2016 14:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.