Show filters
37 Total Results
Displaying 31-37 of 37
Sort by:
Attacker Value
Unknown

CVE-2013-1917

Disclosure Date: May 13, 2013 (last updated October 05, 2023)
Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
0
Attacker Value
Unknown

CVE-2013-1920

Disclosure Date: April 12, 2013 (last updated October 05, 2023)
Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.
0
Attacker Value
Unknown

CVE-2012-5514

Disclosure Date: December 13, 2012 (last updated October 05, 2023)
The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
0
Attacker Value
Unknown

CVE-2012-5513

Disclosure Date: December 13, 2012 (last updated October 05, 2023)
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
0
Attacker Value
Unknown

CVE-2012-5515

Disclosure Date: December 13, 2012 (last updated October 05, 2023)
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
0
Attacker Value
Unknown

CVE-2010-4255

Disclosure Date: January 25, 2011 (last updated October 04, 2023)
The fixup_page_fault function in arch/x86/traps.c in Xen 4.0.1 and earlier on 64-bit platforms, when paravirtualization is enabled, does not verify that kernel mode is used to call the handle_gdt_ldt_mapping_fault function, which allows guest OS users to cause a denial of service (host OS BUG_ON) via a crafted memory access.
0
Attacker Value
Unknown

CVE-2010-3699

Disclosure Date: December 08, 2010 (last updated October 04, 2023)
The backend driver in Xen 3.x allows guest OS users to cause a denial of service via a kernel thread leak, which prevents the device and guest OS from being shut down or create a zombie domain, causes a hang in zenwatch, or prevents unspecified xm commands from working properly, related to (1) netback, (2) blkback, or (3) blktap.
0