Max CVSS | 7.1 | Min CVSS | 1.9 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2014-8867 | 4.9 |
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) v
|
30-10-2018 - 16:27 | 01-12-2014 - 15:59 | |
CVE-2014-8866 | 4.7 |
The compatibility mode hypercall argument translation in Xen 3.3.x through 4.4.x, when running on a 64-bit hypervisor, allows local 32-bit HVM guests to cause a denial of service (host crash) via vectors involving altering the high halves of register
|
30-10-2018 - 16:27 | 01-12-2014 - 15:59 | |
CVE-2014-8594 | 5.4 |
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation ser
|
30-10-2018 - 16:27 | 19-11-2014 - 18:59 | |
CVE-2014-8595 | 1.9 |
arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJM
|
30-10-2018 - 16:27 | 19-11-2014 - 18:59 | |
CVE-2014-9030 | 7.1 |
The do_mmu_update function in arch/x86/mm.c in Xen 3.2.x through 4.4.x does not properly manage page references, which allows remote domains to cause a denial of service by leveraging control over an HVM guest and a crafted MMU_MACHPHYS_UPDATE.
|
30-10-2018 - 16:27 | 24-11-2014 - 15:59 |