Show filters
555 Total Results
Displaying 421-430 of 555
Sort by:
Attacker Value
Unknown
CVE-2014-2986
Disclosure Date: April 28, 2014 (last updated October 05, 2023)
The vgic_distr_mmio_write function in the virtual guest interrupt controller (GIC) distributor (arch/arm/vgic.c) in Xen 4.4.x, when running on an ARM system, allows local guest users to cause a denial of service (NULL pointer dereference and host crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-2915
Disclosure Date: April 24, 2014 (last updated October 05, 2023)
Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors, (3) debug registers, and (4) other unspecified registers.
0
Attacker Value
Unknown
CVE-2014-2580
Disclosure Date: April 15, 2014 (last updated October 05, 2023)
The netback driver in Xen, when using certain Linux versions that do not allow sleeping in softirq context, allows local guest administrators to cause a denial of service ("scheduling while atomic" error and host crash) via a malformed packet, which causes a mutex to be taken when trying to disable the interface.
0
Attacker Value
Unknown
CVE-2014-1894
Disclosure Date: April 01, 2014 (last updated October 05, 2023)
Multiple integer overflows in unspecified suboperations in the flask hypercall in Xen 3.2.x and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1893.
0
Attacker Value
Unknown
CVE-2014-1891
Disclosure Date: April 01, 2014 (last updated October 05, 2023)
Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1892, CVE-2014-1893, and CVE-2014-1894.
0
Attacker Value
Unknown
CVE-2014-1895
Disclosure Date: April 01, 2014 (last updated October 05, 2023)
Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read.
0
Attacker Value
Unknown
CVE-2014-1893
Disclosure Date: April 01, 2014 (last updated October 05, 2023)
Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1894.
0
Attacker Value
Unknown
CVE-2014-1892
Disclosure Date: April 01, 2014 (last updated October 05, 2023)
Xen 3.3 through 4.1, when XSM is enabled, allows local users to cause a denial of service via vectors related to a "large memory allocation," a different vulnerability than CVE-2014-1891, CVE-2014-1893, and CVE-2014-1894.
0
Attacker Value
Unknown
CVE-2014-1896
Disclosure Date: April 01, 2014 (last updated October 05, 2023)
The (1) do_send and (2) do_recv functions in io.c in libvchan in Xen 4.2.x, 4.3.x, and 4.4-RC series allows local guests to cause a denial of service or possibly gain privileges via crafted xenstore ring indexes, which triggers a "read or write past the end of the ring."
0
Attacker Value
Unknown
CVE-2011-3346
Disclosure Date: April 01, 2014 (last updated November 08, 2023)
Buffer overflow in hw/scsi-disk.c in the SCSI subsystem in QEMU before 0.15.2, as used by Xen, might allow local guest users with permission to access the CD-ROM to cause a denial of service (guest crash) via a crafted SAI READ CAPACITY SCSI command. NOTE: this is only a vulnerability when root has manually modified certain permissions or ACLs.
0