Show filters
70 Total Results
Displaying 31-40 of 70
Sort by:
Attacker Value
Unknown
CVE-2015-4103
Disclosure Date: June 03, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x does not properly restrict write access to the host MSI message data field, which allows local x86 HVM guest administrators to cause a denial of service (host interrupt handling confusion) via vectors related to qemu and accessing spanning multiple fields.
0
Attacker Value
Unknown
CVE-2015-4104
Disclosure Date: June 03, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x does not properly restrict access to PCI MSI mask bits, which allows local x86 HVM guest users to cause a denial of service (unexpected interrupt and host crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-3340
Disclosure Date: April 28, 2015 (last updated October 05, 2023)
Xen 4.2.x through 4.5.x does not initialize certain fields, which allows certain remote service domains to obtain sensitive information from memory via a (1) XEN_DOMCTL_gettscinfo or (2) XEN_SYSCTL_getdomaininfolist request.
0
Attacker Value
Unknown
CVE-2015-2751
Disclosure Date: April 01, 2015 (last updated October 05, 2023)
Xen 4.3.x, 4.4.x, and 4.5.x, when using toolstack disaggregation, allows remote domains with partial management control to cause a denial of service (host lock) via unspecified domctl operations.
0
Attacker Value
Unknown
CVE-2015-2756
Disclosure Date: April 01, 2015 (last updated October 05, 2023)
QEMU, as used in Xen 3.3.x through 4.5.x, does not properly restrict access to PCI command registers, which might allow local HVM guest users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
0
Attacker Value
Unknown
CVE-2015-2752
Disclosure Date: April 01, 2015 (last updated October 05, 2023)
The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
0
Attacker Value
Unknown
CVE-2015-2151
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-2044
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
0
Attacker Value
Unknown
CVE-2015-2150
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
Xen 3.3.x through 4.5.x and the Linux kernel through 3.19.1 do not properly restrict access to PCI command registers, which might allow local guest OS users to cause a denial of service (non-maskable interrupt and host crash) by disabling the (1) memory or (2) I/O decoding for a PCI Express device and then accessing the device, which triggers an Unsupported Request (UR) response.
0
Attacker Value
Unknown
CVE-2015-2045
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
0