Vulnerabilities > XEN > XEN > 4.1.6.1

DATE CVE VULNERABILITY TITLE RISK
2015-03-12 CVE-2015-2044 Information Exposure vulnerability in XEN
The emulation routines for unspecified X86 devices in Xen 3.2.x through 4.5.x does not properly initialize data, which allow local HVM guest users to obtain sensitive information via vectors involving an unsupported access size.
local
low complexity
xen CWE-200
2.1
2015-02-09 CVE-2015-1563 Resource Management Errors vulnerability in multiple products
The ARM GIC distributor virtualization in Xen 4.4.x and 4.5.x allows local guests to cause a denial of service by causing a large number messages to be logged.
local
low complexity
xen fedoraproject CWE-399
2.1
2014-12-09 CVE-2014-9066 Code vulnerability in multiple products
Xen 4.4.x and earlier, when using a large number of VCPUs, does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability than CVE-2014-9065.
4.7
2014-12-09 CVE-2014-9065 Code vulnerability in multiple products
common/spinlock.c in Xen 4.4.x and earlier does not properly handle read and write locks, which allows local x86 guest users to cause a denial of service (write denial or NMI watchdog timeout and host crash) via a large number of read requests, a different vulnerability to CVE-2014-9066.
4.4
2014-12-01 CVE-2014-8866 Code vulnerability in multiple products
The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of registers while in 64-bit mode.
4.7
2014-11-24 CVE-2014-9030 Improper Input Validation vulnerability in multiple products
The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
7.1
2014-11-19 CVE-2014-8595 Code vulnerability in multiple products
arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
1.9
2014-11-19 CVE-2014-8594 Improper Input Validation vulnerability in multiple products
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
network
high complexity
opensuse debian xen CWE-20
5.4
2014-10-02 CVE-2014-7188 Resource Management Errors vulnerability in XEN
The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.
low complexity
xen CWE-399
8.3
2014-10-02 CVE-2014-7156 Permissions, Privileges, and Access Controls vulnerability in XEN
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
low complexity
xen CWE-264
3.3