Vulnerabilities > XEN > XEN > 4.5.2
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2015-12-17 | CVE-2015-8339 | Data Processing Errors vulnerability in XEN The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown. | 4.7 |
2015-12-17 | CVE-2015-8338 | 7PK - Security Features vulnerability in XEN Xen 4.6.x and earlier does not properly enforce limits on page order inputs for the (1) XENMEM_increase_reservation, (2) XENMEM_populate_physmap, (3) XENMEM_exchange, and possibly other HYPERVISOR_memory_op suboperations, which allows ARM guest OS administrators to cause a denial of service (CPU consumption, guest reboot, or watchdog timeout and host reboot) and possibly have unspecified other impact via unknown vectors. | 7.2 |
2015-11-17 | CVE-2015-7812 | 7PK - Security Features vulnerability in XEN The hypercall_create_continuation function in arch/arm/domain.c in Xen 4.4.x through 4.6.x allows local guest users to cause a denial of service (host crash) via a preemptible hypercall to the multicall interface. | 4.9 |
2015-10-30 | CVE-2015-7814 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in XEN Race condition in the relinquish_memory function in arch/arm/domain.c in Xen 4.6.x and earlier allows local domains with partial management control to cause a denial of service (host crash) via vectors involving the destruction of a domain and using XENMEM_decrease_reservation to reduce the memory of the domain. | 4.7 |