Show filters
555 Total Results
Displaying 431-440 of 555
Sort by:
Attacker Value
Unknown

CVE-2014-2599

Disclosure Date: March 28, 2014 (last updated October 05, 2023)
The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for 32-bit and 4.1.x through 4.4.x for 64-bit allow local guest administrators to cause a denial of service (CPU consumption) by leveraging access to certain service domains for HVM guests and a large input.
0
Attacker Value
Unknown

CVE-2014-1950

Disclosure Date: February 14, 2014 (last updated October 05, 2023)
Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors.
0
Attacker Value
Unknown

CVE-2014-1642

Disclosure Date: January 26, 2014 (last updated October 05, 2023)
The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.
0
Attacker Value
Unknown

CVE-2014-1666

Disclosure Date: January 26, 2014 (last updated October 05, 2023)
The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service (host or guest malfunction) or possibly gain privileges via unspecified vectors.
0
Attacker Value
Unknown

CVE-2013-4375

Disclosure Date: January 19, 2014 (last updated October 05, 2023)
The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors.
0
Attacker Value
Unknown

CVE-2011-1936

Disclosure Date: January 07, 2014 (last updated October 05, 2023)
Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.
0
Attacker Value
Unknown

CVE-2011-1780

Disclosure Date: January 07, 2014 (last updated October 05, 2023)
The instruction emulation in Xen 3.0.3 allows local SMP guest users to cause a denial of service (host crash) by replacing the instruction that causes the VM to exit in one thread with a different instruction in a different thread.
0
Attacker Value
Unknown

CVE-2011-1166

Disclosure Date: January 07, 2014 (last updated October 05, 2023)
Xen, possibly before 4.0.2, allows local 64-bit PV guests to cause a denial of service (host crash) by specifying user mode execution without user-mode pagetables.
0
Attacker Value
Unknown

CVE-2011-1763

Disclosure Date: January 07, 2014 (last updated October 05, 2023)
The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.
0
Attacker Value
Unknown

CVE-2011-2519

Disclosure Date: December 27, 2013 (last updated October 05, 2023)
Xen in the Linux kernel, when running a guest on a host without hardware assisted paging (HAP), allows guest users to cause a denial of service (invalid pointer dereference and hypervisor crash) via the SAHF instruction.
0