Show filters
44 Total Results
Displaying 11-20 of 44
Sort by:
Attacker Value
Unknown

CVE-2015-7835

Disclosure Date: October 30, 2015 (last updated October 05, 2023)
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
0
Attacker Value
Unknown

CVE-2015-7972

Disclosure Date: October 30, 2015 (last updated October 05, 2023)
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
0
Attacker Value
Unknown

CVE-2015-7971

Disclosure Date: October 30, 2015 (last updated October 05, 2023)
Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
0
Attacker Value
Unknown

CVE-2015-7969

Disclosure Date: October 30, 2015 (last updated October 05, 2023)
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
0
Attacker Value
Unknown

CVE-2015-7311

Disclosure Date: October 01, 2015 (last updated October 05, 2023)
libxl in Xen 4.1.x through 4.6.x does not properly handle the readonly flag on disks when using the qemu-xen device model, which allows local guest users to write to a read-only disk image.
0
Attacker Value
Unknown

CVE-2015-3259

Disclosure Date: July 16, 2015 (last updated October 05, 2023)
Stack-based buffer overflow in the xl command line utility in Xen 4.1.x through 4.5.x allows local guest administrators to gain privileges via a long configuration argument.
0
Attacker Value
Unknown

CVE-2015-4164

Disclosure Date: June 15, 2015 (last updated October 05, 2023)
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
0
Attacker Value
Unknown

CVE-2015-4105

Disclosure Date: June 03, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x enables logging for PCI MSI-X pass-through error messages, which allows local x86 HVM guests to cause a denial of service (host disk consumption) via certain invalid operations.
0
Attacker Value
Unknown

CVE-2015-4103

Disclosure Date: June 03, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
0
Attacker Value
Unknown

CVE-2015-4104

Disclosure Date: June 03, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
0