Show filters
555 Total Results
Displaying 351-360 of 555
Sort by:
Attacker Value
Unknown
CVE-2016-1570
Disclosure Date: January 22, 2016 (last updated November 25, 2024)
The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
0
Attacker Value
Unknown
CVE-2016-1571
Disclosure Date: January 22, 2016 (last updated November 25, 2024)
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
0
Attacker Value
Unknown
CVE-2015-8615
Disclosure Date: January 08, 2016 (last updated November 25, 2024)
The hvm_set_callback_via function in arch/x86/hvm/irq.c in Xen 4.6 does not limit the number of printk console messages when logging the new callback method, which allows local HVM guest OS users to cause a denial of service via a large number of changes to the callback method (HVM_PARAM_CALLBACK_IRQ).
0
Attacker Value
Unknown
CVE-2015-8338
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
Xen 4.6.x and earlier does not properly enforce limits on page order inputs for the (1) XENMEM_increase_reservation, (2) XENMEM_populate_physmap, (3) XENMEM_exchange, and possibly other HYPERVISOR_memory_op suboperations, which allows ARM guest OS administrators to cause a denial of service (CPU consumption, guest reboot, or watchdog timeout and host reboot) and possibly have unspecified other impact via unknown vectors.
0
Attacker Value
Unknown
CVE-2015-8340
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
0
Attacker Value
Unknown
CVE-2015-8341
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
0
Attacker Value
Unknown
CVE-2015-8339
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
0
Attacker Value
Unknown
CVE-2015-7812
Disclosure Date: November 17, 2015 (last updated October 05, 2023)
The hypercall_create_continuation function in arch/arm/domain.c in Xen 4.4.x through 4.6.x allows local guest users to cause a denial of service (host crash) via a preemptible hypercall to the multicall interface.
0
Attacker Value
Unknown
CVE-2015-8104
Disclosure Date: November 16, 2015 (last updated October 05, 2023)
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #DB (aka Debug) exceptions, related to svm.c.
0
Attacker Value
Unknown
CVE-2015-5307
Disclosure Date: November 16, 2015 (last updated October 05, 2023)
The KVM subsystem in the Linux kernel through 4.2.6, and Xen 4.3.x through 4.6.x, allows guest OS users to cause a denial of service (host OS panic or hang) by triggering many #AC (aka Alignment Check) exceptions, related to svm.c and vmx.c.
0