Xen

Xen

479 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.16%
  • Veröffentlicht 13.04.2016 15:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption)...

  • EPSS 0.15%
  • Veröffentlicht 12.04.2016 16:59:02
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain se...

  • EPSS 0.07%
  • Veröffentlicht 19.02.2016 16:59:01
  • Zuletzt bearbeitet 12.04.2025 10:46:40

VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.

  • EPSS 0.3%
  • Veröffentlicht 19.02.2016 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.

  • EPSS 0.3%
  • Veröffentlicht 22.01.2016 15:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest add...

  • EPSS 0.2%
  • Veröffentlicht 22.01.2016 15:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page ident...

  • EPSS 0.24%
  • Veröffentlicht 08.01.2016 19:59:17
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of cha...

  • EPSS 0.73%
  • Veröffentlicht 17.12.2015 19:59:09
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory an...

  • EPSS 0.07%
  • Veröffentlicht 17.12.2015 19:59:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exc...

  • EPSS 0.1%
  • Veröffentlicht 17.12.2015 19:59:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain te...