Xen

Xen

479 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 21.05.2013 18:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 4.0.x and 4.1.x incorrectly releases a grant reference when releasing a non-v1, non-transitive grant, which allows local guest administrators to cause a denial of service (host crash), obtain sensitive information, or possibly have other impacts ...

  • EPSS 0.07%
  • Veröffentlicht 13.05.2013 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of ser...

  • EPSS 0.07%
  • Veröffentlicht 13.05.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is ...

  • EPSS 0.1%
  • Veröffentlicht 13.05.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal."

  • EPSS 0.1%
  • Veröffentlicht 13.05.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices."

  • EPSS 0.08%
  • Veröffentlicht 13.05.2013 23:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is use...

  • EPSS 0.06%
  • Veröffentlicht 12.04.2013 22:55:01
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-a...

  • EPSS 0.22%
  • Veröffentlicht 07.03.2013 05:04:44
  • Zuletzt bearbeitet 11.04.2025 00:51:21

oxenstored in Xen 4.1.x, Xen 4.2.x, and xen-unstable does not properly consider the state of the Xenstore ring during read operations, which allows guest OS users to cause a denial of service (daemon crash and host-control outage, or memory consumpti...

  • EPSS 0.13%
  • Veröffentlicht 07.03.2013 05:04:42
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings an...

  • EPSS 0.12%
  • Veröffentlicht 14.02.2013 22:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt...