Vulnerabilities > XEN > XEN > 4.7.3
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2017-07-05 | CVE-2017-10917 | NULL Pointer Dereference vulnerability in XEN Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221. | 9.4 |
2017-07-05 | CVE-2017-10915 | Race Condition vulnerability in XEN The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219. | 6.8 |
2017-07-05 | CVE-2017-10914 | Race Condition vulnerability in XEN The grant-table feature in Xen through 4.8.x has a race condition leading to a double free, which allows guest OS users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka XSA-218 bug 2. | 6.8 |
2017-07-05 | CVE-2017-10913 | Unspecified vulnerability in XEN The grant-table feature in Xen through 4.8.x provides false mapping information in certain cases of concurrent unmap calls, which allows backend attackers to obtain sensitive information or gain privileges, aka XSA-218 bug 1. | 7.5 |
2017-07-05 | CVE-2017-10912 | Privilege Escalation vulnerability in Xen Page Transfer 'xen/arch/x86/mm.c' Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217. | 10.0 |
2017-01-26 | CVE-2016-10024 | Improper Input Validation vulnerability in multiple products Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations. | 4.9 |
2017-01-26 | CVE-2016-10013 | Permissions, Privileges, and Access Controls vulnerability in XEN Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation. | 4.6 |