Show filters
44 Total Results
Displaying 1-10 of 44
Sort by:
Attacker Value
Unknown

CVE-2017-14431

Disclosure Date: September 13, 2017 (last updated November 26, 2024)
Memory leak in Xen 3.3 through 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207.
0
Attacker Value
Unknown

CVE-2016-9932

Disclosure Date: January 26, 2017 (last updated November 25, 2024)
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
0
Attacker Value
Unknown

CVE-2016-6258

Disclosure Date: August 02, 2016 (last updated November 25, 2024)
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
0
Attacker Value
Unknown

CVE-2015-8552

Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
0
Attacker Value
Unknown

CVE-2016-1571

Disclosure Date: January 22, 2016 (last updated November 25, 2024)
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
0
Attacker Value
Unknown

CVE-2015-8340

Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
0
Attacker Value
Unknown

CVE-2015-8339

Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown.
0
Attacker Value
Unknown

CVE-2015-7835

Disclosure Date: October 30, 2015 (last updated October 05, 2023)
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
0
Attacker Value
Unknown

CVE-2015-7972

Disclosure Date: October 30, 2015 (last updated October 05, 2023)
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure."
0
Attacker Value
Unknown

CVE-2015-7971

Disclosure Date: October 30, 2015 (last updated October 05, 2023)
Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c.
0