Show filters
46 Total Results
Displaying 11-20 of 46
Sort by:
Attacker Value
Unknown
CVE-2015-7970
Disclosure Date: October 30, 2015 (last updated October 05, 2023)
The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand.
0
Attacker Value
Unknown
CVE-2015-4164
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
0
Attacker Value
Unknown
CVE-2015-4105
Disclosure Date: June 03, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
0
Attacker Value
Unknown
CVE-2015-4103
Disclosure Date: June 03, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
0
Attacker Value
Unknown
CVE-2015-4104
Disclosure Date: June 03, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-0777
Disclosure Date: April 05, 2015 (last updated October 05, 2023)
drivers/xen/usbback/usbback.c in linux-2.6.18-xen-3.4.0 (aka the Xen 3.4.x support patches for the Linux kernel 2.6.18), as used in the Linux kernel 2.6.x and 3.x in SUSE Linux distributions, allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-2151
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-2044
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
0
Attacker Value
Unknown
CVE-2015-2150
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
0
Attacker Value
Unknown
CVE-2015-2045
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
0