Show filters
31 Total Results
Displaying 1-10 of 31
Sort by:
Attacker Value
Unknown
CVE-2015-8552
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
0
Attacker Value
Unknown
CVE-2015-8340
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
0
Attacker Value
Unknown
CVE-2015-8339
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
0
Attacker Value
Unknown
CVE-2015-7971
Disclosure Date: October 30, 2015 (last updated October 05, 2023)
Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
0
Attacker Value
Unknown
CVE-2015-4164
Disclosure Date: June 15, 2015 (last updated October 05, 2023)
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
0
Attacker Value
Unknown
CVE-2015-2151
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The x86 emulator in Xen 3.2.x through 4.5.x does not properly ignore segment overrides for instructions with register operands, which allows local guest users to obtain sensitive information, cause a denial of service (memory corruption), or possibly execute arbitrary code via unspecified vectors.
0
Attacker Value
Unknown
CVE-2015-2044
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
0
Attacker Value
Unknown
CVE-2015-2045
Disclosure Date: March 12, 2015 (last updated October 05, 2023)
The HYPERVISOR_xen_version hypercall in Xen 3.2.x through 4.5.x does not properly initialize data structures, which allows local guest users to obtain sensitive information via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-8867
Disclosure Date: December 01, 2014 (last updated October 05, 2023)
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2014-9030
Disclosure Date: November 24, 2014 (last updated October 05, 2023)
The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
0