Xen

Xen

483 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 05.06.2014 20:55:06
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x, when running on an ARM system, does not properly check write permissions on virtual addresses, which allows local guest administrators to gain privileges via unspecified vectors.

  • EPSS 0.18%
  • Veröffentlicht 19.05.2014 14:55:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The ARM image loading functionality in Xen 4.4.x does not properly validate kernel length, which allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit ARM guest kernel in an image, which triggers a buffer ...

  • EPSS 0.18%
  • Veröffentlicht 19.05.2014 14:55:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Buffer overflow in Xen 4.4.x allows local users to read system memory or cause a denial of service (crash) via a crafted 32-bit guest kernel, related to searching for an appended DTB.

  • EPSS 0.15%
  • Veröffentlicht 19.05.2014 14:55:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x does not properly check alignment, which allows local users to cause a denial of service (crash) via an unspecified field in a DTB header in a 32-bit guest kernel.

  • EPSS 0.18%
  • Veröffentlicht 19.05.2014 14:55:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

  • EPSS 0.53%
  • Veröffentlicht 07.05.2014 10:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page ta...

  • EPSS 0.31%
  • Veröffentlicht 02.05.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

  • EPSS 0.21%
  • Veröffentlicht 28.04.2014 14:09:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The vgic_distr_mmio_write function in the virtual guest interrupt controller (GIC) distributor (arch/arm/vgic.c) in Xen 4.4.x, when running on an ARM system, allows local guest users to cause a denial of service (NULL pointer dereference and host cra...

  • EPSS 0.12%
  • Veröffentlicht 24.04.2014 14:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors,...

  • EPSS 0.07%
  • Veröffentlicht 15.04.2014 23:13:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The netback driver in Xen, when using certain Linux versions that do not allow sleeping in softirq context, allows local guest administrators to cause a denial of service ("scheduling while atomic" error and host crash) via a malformed packet, which ...