Xen

Xen

483 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.12%
  • Veröffentlicht 30.10.2015 15:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory con...

  • EPSS 0.09%
  • Veröffentlicht 30.10.2015 15:59:05
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated us...

  • EPSS 0.12%
  • Veröffentlicht 30.10.2015 15:59:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

  • EPSS 0.08%
  • Veröffentlicht 30.10.2015 15:59:03
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Race condition in the relinquish_memory function in arch/arm/domain.c in Xen 4.6.x and earlier allows local domains with partial management control to cause a denial of service (host crash) via vectors involving the destruction of a domain and using ...

  • EPSS 0.11%
  • Veröffentlicht 30.10.2015 15:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x, 4.5.x, and 4.6.x does not limit the number of printk console messages when reporting unimplemented hypercalls, which allows local guests to cause a denial of service via a sequence of (1) HYPERVISOR_physdev_op hypercalls, which are not pro...

  • EPSS 0.07%
  • Veröffentlicht 01.10.2015 20:59:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.

  • EPSS 0.05%
  • Veröffentlicht 03.09.2015 14:59:10
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The xenmem_add_to_physmap_one function in arch/arm/mm.c in Xen 4.5.x, 4.4.x, and earlier does not limit the number of printk console messages when reporting a failure to retrieve a reference on a foreign page, which allows remote domains to cause a d...

  • EPSS 0.07%
  • Veröffentlicht 12.08.2015 14:59:25
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Use-after-free vulnerability in QEMU in Xen 4.5.x and earlier does not completely unplug emulated block devices, which allows local HVM guest users to gain privileges by unplugging a block device twice.

  • EPSS 9.72%
  • Veröffentlicht 12.08.2015 14:59:24
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The C+ mode offload emulation in the RTL8139 network card device model in QEMU, as used in Xen 4.5.x and earlier, allows remote attackers to read process heap memory via unspecified vectors.

  • EPSS 0.39%
  • Veröffentlicht 12.08.2015 14:59:23
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Heap-based buffer overflow in the IDE subsystem in QEMU, as used in Xen 4.5.x and earlier, when the container has a CDROM drive enabled, allows local guest users to execute arbitrary code on the host via unspecified ATAPI commands.