Xen

Xen

479 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.18%
  • Veröffentlicht 19.05.2014 14:55:12
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

  • EPSS 0.53%
  • Veröffentlicht 07.05.2014 10:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page ta...

  • EPSS 0.31%
  • Veröffentlicht 02.05.2014 14:55:07
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

  • EPSS 0.21%
  • Veröffentlicht 28.04.2014 14:09:08
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The vgic_distr_mmio_write function in the virtual guest interrupt controller (GIC) distributor (arch/arm/vgic.c) in Xen 4.4.x, when running on an ARM system, allows local guest users to cause a denial of service (NULL pointer dereference and host cra...

  • EPSS 0.12%
  • Veröffentlicht 24.04.2014 14:55:04
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors,...

  • EPSS 0.07%
  • Veröffentlicht 15.04.2014 23:13:13
  • Zuletzt bearbeitet 12.04.2025 10:46:40

The netback driver in Xen, when using certain Linux versions that do not allow sleeping in softirq context, allows local guest administrators to cause a denial of service ("scheduling while atomic" error and host crash) via a malformed packet, which ...

  • EPSS 0.27%
  • Veröffentlicht 01.04.2014 06:35:53
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause ...

  • EPSS 0.27%
  • Veröffentlicht 01.04.2014 06:35:53
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Xen 3.3 through 4.1, when XSM is enabled, allows local users to cause a denial of service via vectors related to a "large memory allocation," a different vulnerability than CVE-2014-1891, CVE-2014-1893, and CVE-2014-1894.

  • EPSS 0.27%
  • Veröffentlicht 01.04.2014 06:35:53
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecif...

  • EPSS 0.27%
  • Veröffentlicht 01.04.2014 06:35:53
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Multiple integer overflows in unspecified suboperations in the flask hypercall in Xen 3.2.x and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE...