Show filters
555 Total Results
Displaying 211-220 of 555
Sort by:
Attacker Value
Unknown

CVE-2018-19962

Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
0
Attacker Value
Unknown

CVE-2018-19964

Disclosure Date: December 08, 2018 (last updated November 27, 2024)
An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.
0
Attacker Value
Unknown

CVE-2018-19961

Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
0
Attacker Value
Unknown

CVE-2018-19966

Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because of an interpretation conflict for a union data structure associated with shadow paging. NOTE: this issue exists because of an incorrect fix for CVE-2017-15595.
0
Attacker Value
Unknown

CVE-2018-19963

Disclosure Date: December 08, 2018 (last updated November 27, 2024)
An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.
0
Attacker Value
Unknown

CVE-2018-19967

Disclosure Date: December 08, 2018 (last updated November 27, 2024)
An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix.
0
Attacker Value
Unknown

CVE-2018-19965

Disclosure Date: December 08, 2018 (last updated November 08, 2023)
An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation.
0
Attacker Value
Unknown

CVE-2018-18883

Disclosure Date: November 01, 2018 (last updated November 27, 2024)
An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.
0
Attacker Value
Unknown

CVE-2018-15470

Disclosure Date: August 17, 2018 (last updated November 27, 2024)
An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.
0
Attacker Value
Unknown

CVE-2018-15471

Disclosure Date: August 17, 2018 (last updated November 27, 2024)
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.