Page 19 of 384 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device. Se detectó un problema en Xen versiones hasta 4.11.x, permitiendo a usuarios del sistema operativo invitado PV de x86, causar una denegación de servicio u alcanzar privilegios mediante el aprovechamiento de una condición de carrera de escritura de página durante la adición de un dispositivo PCI transferido. • http://www.openwall.com/lists/oss-security/2019/10/25/6 http://xenbits.xen.org/xsa/advisory-285.html https://seclists.org/bugtraq/2020/Jan/21 https://www.debian.org/security/2020/dsa-4602 https://xenbits.xen.org/xsa/advisory-285.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 7.0EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced. Se detectó un problema en Xen versiones hasta 4.11.x, permitiendo a usuarios del sistema operativo invitado PV de x86, causar una denegación de servicio u alcanzar privilegios mediante el aprovechamiento de una condición de carrera que surgió cuando se introdujo XENMEM_exchange. • http://www.openwall.com/lists/oss-security/2019/10/25/2 http://xenbits.xen.org/xsa/advisory-287.html https://seclists.org/bugtraq/2020/Jan/21 https://www.debian.org/security/2020/dsa-4602 https://xenbits.xen.org/xsa/advisory-287.html • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVSS: 6.8EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging incorrect use of the HVM physmap concept for PV domains. Se detectó un problema en Xen versiones hasta 4.11.x, permitiendo a usuarios del sistema operativo invitado PV de x86, causar una denegación de servicio u alcanzar privilegios mediante el aprovechamiento del uso incorrecto del concepto physmap de HVM para dominios PV. • http://www.openwall.com/lists/oss-security/2019/10/25/10 http://xenbits.xen.org/xsa/advisory-288.html https://seclists.org/bugtraq/2020/Jan/21 https://www.debian.org/security/2020/dsa-4602 https://xenbits.xen.org/xsa/advisory-288.html • CWE-667: Improper Locking •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service by leveraging a long-running operation that exists to support restartability of PTE updates. Se detectó un problema en Xen versiones hasta 4.11.x, permitiendo a usuarios del sistema operativo invitado PV de x86, causar una denegación de servicio mediante el aprovechamiento de una operación de larga ejecución que se presenta para soportar la reiniciabilidad de las actualizaciones PTE. • http://www.openwall.com/lists/oss-security/2019/10/25/3 http://xenbits.xen.org/xsa/advisory-290.html https://seclists.org/bugtraq/2020/Jan/21 https://www.debian.org/security/2020/dsa-4602 https://xenbits.xen.org/xsa/advisory-290.html • CWE-662: Improper Synchronization •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest. Se detectó un problema en Xen versiones 4.8.x hasta 4.11.x, permitiendo a usuarios del sistema operativo invitado PV de x86, causar una denegación de servicio porque el manejo inapropiado de las operaciones fallidas de IOMMU causa una comprobación de errores durante la limpieza de un invitado bloqueado. • http://www.openwall.com/lists/oss-security/2019/10/25/4 http://xenbits.xen.org/xsa/advisory-291.html https://seclists.org/bugtraq/2020/Jan/21 https://www.debian.org/security/2020/dsa-4602 https://xenbits.xen.org/xsa/advisory-291.html •