Show filters
19 Total Results
Displaying 1-10 of 19
Sort by:
Attacker Value
Unknown
CVE-2015-6815
Disclosure Date: January 31, 2020 (last updated November 28, 2024)
The process_tx_desc function in hw/net/e1000.c in QEMU before 2.4.0.1 does not properly process transmit descriptor data when sending a network packet, which allows attackers to cause a denial of service (infinite loop and guest crash) via unspecified vectors.
0
Attacker Value
Unknown
CVE-2017-15596
Disclosure Date: October 18, 2017 (last updated November 26, 2024)
An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
0
Attacker Value
Unknown
CVE-2017-14431
Disclosure Date: September 13, 2017 (last updated November 26, 2024)
Memory leak in Xen 3.3 through 4.8.x allows guest OS users to cause a denial of service (ARM or x86 AMD host OS memory consumption) by continually rebooting, because certain cleanup is skipped if no pass-through device was ever assigned, aka XSA-207.
0
Attacker Value
Unknown
CVE-2016-9932
Disclosure Date: January 26, 2017 (last updated November 25, 2024)
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
0
Attacker Value
Unknown
CVE-2016-9382
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
0
Attacker Value
Unknown
CVE-2016-9385
Disclosure Date: January 23, 2017 (last updated November 25, 2024)
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
0
Attacker Value
Unknown
CVE-2016-7154
Disclosure Date: September 21, 2016 (last updated November 25, 2024)
Use-after-free vulnerability in the FIFO event channel code in Xen 4.4.x allows local guest OS administrators to cause a denial of service (host crash) and possibly execute arbitrary code or obtain sensitive information via an invalid guest frame number.
0
Attacker Value
Unknown
CVE-2016-4962
Disclosure Date: June 07, 2016 (last updated November 25, 2024)
The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.
0
Attacker Value
Unknown
CVE-2016-4963
Disclosure Date: June 07, 2016 (last updated November 25, 2024)
The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.
0
Attacker Value
Unknown
CVE-2016-5242
Disclosure Date: June 07, 2016 (last updated November 25, 2024)
The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding references to them, related to VMID exhaustion.
0