XEN : Security Vulnerabilities, CVEs, Published In October 2014
The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
Max CVSS
8.3
EPSS Score
0.38%
Published
2014-10-02
Updated
2018-10-30
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
Max CVSS
3.3
EPSS Score
0.06%
Published
2014-10-02
Updated
2018-10-30
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
Max CVSS
5.8
EPSS Score
0.06%
Published
2014-10-02
Updated
2018-10-30
Race condition in HVMOP_track_dirty_vram in Xen 4.0.0 through 4.4.x does not ensure possession of the guarding lock for dirty video RAM tracking, which allows certain local guest domains to cause a denial of service via unspecified vectors.
Max CVSS
6.1
EPSS Score
0.06%
Published
2014-10-02
Updated
2018-10-30
Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
Max CVSS
4.6
EPSS Score
0.06%
Published
2014-10-26
Updated
2017-08-29
5 vulnerabilities found