Vulnerabilities > XEN > XEN > 4.0.1

DATE CVE VULNERABILITY TITLE RISK
2014-12-09 CVE-2014-9066 Code vulnerability in multiple products
Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability than CVE-2014-9065.
4.7
2014-12-09 CVE-2014-9065 Code vulnerability in multiple products
common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066.
4.4
2014-12-01 CVE-2014-8866 Code vulnerability in multiple products
The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
4.7
2014-11-24 CVE-2014-9030 Improper Input Validation vulnerability in multiple products
The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
7.1
2014-11-19 CVE-2014-8595 Code vulnerability in multiple products
arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
1.9
2014-11-19 CVE-2014-8594 Improper Input Validation vulnerability in multiple products
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
network
high complexity
opensuse debian xen CWE-20
5.4
2014-10-02 CVE-2014-7155 Permissions, Privileges, and Access Controls vulnerability in multiple products
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
5.8
2014-06-18 CVE-2014-4021 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in XEN
Xen 3.2.x through 4.4.x does not properly clean memory pages recovered from guests, which allows local guest OS users to obtain sensitive information via unspecified vectors.
low complexity
xen CWE-119
2.7
2014-04-01 CVE-2014-1893 Numeric Errors vulnerability in XEN
Multiple integer overflows in the (1) FLASK_GETBOOL and (2) FLASK_SETBOOL suboperations in the flask hypercall in Xen 4.1.x, 3.3.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1891, CVE-2014-1892, and CVE-2014-1894.
5.2
2014-04-01 CVE-2014-1892 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in XEN
Xen 3.3 through 4.1, when XSM is enabled, allows local users to cause a denial of service via vectors related to a "large memory allocation," a different vulnerability than CVE-2014-1891, CVE-2014-1893, and CVE-2014-1894.
5.2