Show filters
99 Total Results
Displaying 1-10 of 99
Sort by:
Attacker Value
Unknown
CVE-2017-14431
Disclosure Date: September 13, 2017 (last updated November 26, 2024)
Memory leak in Xen 3.3 through 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207.
0
Attacker Value
Unknown
CVE-2016-9932
Disclosure Date: January 26, 2017 (last updated November 25, 2024)
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
0
Attacker Value
Unknown
CVE-2016-9382
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
0
Attacker Value
Unknown
CVE-2016-6258
Disclosure Date: August 02, 2016 (last updated November 25, 2024)
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
0
Attacker Value
Unknown
CVE-2016-4963
Disclosure Date: June 07, 2016 (last updated November 25, 2024)
The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.
0
Attacker Value
Unknown
CVE-2015-8552
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
0
Attacker Value
Unknown
CVE-2016-1570
Disclosure Date: January 22, 2016 (last updated November 25, 2024)
The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates.
0
Attacker Value
Unknown
CVE-2016-1571
Disclosure Date: January 22, 2016 (last updated November 25, 2024)
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
0
Attacker Value
Unknown
CVE-2015-8340
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
0
Attacker Value
Unknown
CVE-2015-8341
Disclosure Date: December 17, 2015 (last updated October 05, 2023)
The libxl toolstack library in Xen 4.1.x through 4.6.x does not properly release mappings of files used as kernels and initial ramdisks when managing multiple domains in the same process, which allows attackers to cause a denial of service (memory and disk consumption) by starting domains.
0