Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
xen xen 3.0.3 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2009-1758
The hypervisor_callback function in Xen, possibly prior to 3.4.0, as applied to the Linux kernel 2.6.30-rc4, 2.6.18, and probably other versions allows guest user applications to cause a denial of service (kernel oops) of the guest OS by triggering a segmentation fault in "c...
Xen Xen 3.3.0
Xen Xen 3.2.3
Xen Xen 2.0
Xen Xen 3.2.2
Xen Xen 3.2.0
Xen Xen 3.1.4
Xen Xen 3.1.2
Xen Xen
Xen Xen 3.0.3
Xen Xen 3.0.2
Xen Xen 3.2.1
Xen Xen 3.2
Xen Xen 3.1.3
Xen Xen 3.0.4
4.9
CVSSv2
CVE-2013-0290
The __skb_recv_datagram function in net/core/datagram.c in the Linux kernel prior to 3.8 does not properly handle the MSG_PEEK flag with zero-length data, which allows local users to cause a denial of service (infinite loop and system hang) via a crafted application.
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.2.26
Linux Linux Kernel 3.4
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.0.36
4.9
CVSSv2
CVE-2013-0231
The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some o...
Xen Xen 3.0.4
Xen Xen 3.0.2
Xen Xen 3.2.0
Xen Xen 3.1.3
Xen Xen 3.2.3
Xen Xen 3.0.3
Xen Xen 3.1.4
Linux Linux Kernel 2.6.18
Linux Linux Kernel 3.8
Xen Xen 3.2.1
Xen Xen 3.2.2
4.7
CVSSv2
CVE-2012-5515
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and previous versions allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.
Xen Xen 4.1.2
Xen Xen 4.0.4
Xen Xen 3.4.1
Xen Xen 3.4.2
Xen Xen 3.2.0
Xen Xen 3.1.4
Xen Xen 4.1.0
Xen Xen 4.1.3
Xen Xen 3.4.3
Xen Xen 3.4.4
Xen Xen 3.2.2
Xen Xen 3.2.1
Xen Xen 4.0.3
Xen Xen 4.0.2
Xen Xen 3.4.0
Xen Xen 3.3.0
Xen Xen 3.1.3
Xen Xen 3.0.4
Xen Xen
Xen Xen 4.1.1
Xen Xen 4.0.1
Xen Xen 4.0.0
4.7
CVSSv2
CVE-2012-5514
The guest_physmap_mark_populate_on_demand function in Xen 4.2 and previous versions does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.
Xen Xen
Xen Xen 4.0.2
Xen Xen 4.0.1
Xen Xen 3.3.0
Xen Xen 3.3.1
Xen Xen 3.0.4
Xen Xen 3.0.3
Xen Xen 4.0.4
Xen Xen 4.0.3
Xen Xen 3.4.2
Xen Xen 3.4.0
Xen Xen 3.2.0
Xen Xen 3.1.4
Xen Xen 3.1.3
Xen Xen 4.1.1
Xen Xen 4.1.0
Xen Xen 4.0.0
Xen Xen 3.4.3
Xen Xen 3.3.2
Xen Xen 3.2.3
Xen Xen 3.0.2
Xen Xen 4.1.3
4.4
CVSSv2
CVE-2013-1920
Xen 4.2.x, 4.1.x, and previous versions, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free ...
Xen Xen 4.1.2
Xen Xen 4.1.1
Xen Xen 3.3.1
Xen Xen 3.2.3
Xen Xen 3.1.3
Xen Xen 3.0.2
Xen Xen 4.2.0
Xen Xen 4.2.1
Xen Xen 4.0.3
Xen Xen 4.0.2
Xen Xen 3.2.2
Xen Xen 3.1.4
Xen Xen 4.1.4
Xen Xen 4.1.3
Xen Xen 4.0.1
Xen Xen 4.0.0
Xen Xen 3.2.0
Xen Xen 3.0.4
Xen Xen 3.4.2
Xen Xen 3.4.0
Xen Xen 3.4.4
Xen Xen 3.4.1
4.4
CVSSv2
CVE-2009-1630
The nfs_permission function in fs/nfs/dir.c in the NFS client implementation in the Linux kernel 2.6.29.3 and previous versions, when atomic_open is available, does not check execute (aka EXEC or MAY_EXEC) permission bits, which allows local users to bypass permissions and execut...
Linux Linux Kernel
Opensuse Opensuse 11.0
Opensuse Opensuse 11.1
Debian Debian Linux 4.0
Debian Debian Linux 5.0
Canonical Ubuntu Linux 6.06
Canonical Ubuntu Linux 8.04
Canonical Ubuntu Linux 8.10
Canonical Ubuntu Linux 9.04
Vmware Esx 2.5.5
Vmware Esx 3.0.3
Vmware Esx 3.5
Vmware Esx 4.0
4
CVSSv2
CVE-2013-1772
The log_prefix function in kernel/printk.c in the Linux kernel 3.x prior to 3.4.33 does not properly remove a prefix string from a syslog header, which allows local users to cause a denial of service (buffer overflow and system crash) by leveraging /dev/kmsg write access and trig...
Linux Linux Kernel 3.0
Linux Linux Kernel 3.0.35
Linux Linux Kernel 3.0.36
Linux Linux Kernel 3.0.41
Linux Linux Kernel 3.0.20
Linux Linux Kernel 3.0.21
Linux Linux Kernel 3.0.12
Linux Linux Kernel 3.0.13
Linux Linux Kernel 3.0.2
Linux Linux Kernel 3.0.1
Linux Linux Kernel 3.0.31
Linux Linux Kernel 3.0.6
Linux Linux Kernel 3.1
Linux Linux Kernel 3.1.4
Linux Linux Kernel 3.1.3
Linux Linux Kernel 3.0.42
Linux Linux Kernel 3.0.39
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.19
Linux Linux Kernel 3.0.10
Linux Linux Kernel 3.0.11
Linux Linux Kernel 3.0.34
4
CVSSv2
CVE-2013-1774
The chase_port function in drivers/usb/serial/io_ti.c in the Linux kernel prior to 3.7.4 allows local users to cause a denial of service (NULL pointer dereference and system crash) via an attempted /dev/ttyUSB read or write operation on a disconnected Edgeport USB serial converte...
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
Linux Linux Kernel 3.1
Linux Linux Kernel 3.2.5
Linux Linux Kernel 3.2.26
Linux Linux Kernel 3.4
Linux Linux Kernel 3.0.18
Linux Linux Kernel 3.0.6
3.8
CVSSv2
CVE-2013-2140
The dispatch_discard_io function in drivers/block/xen-blkback/blkback.c in the Xen blkback implementation in the Linux kernel prior to 3.10.5 allows guest OS users to cause a denial of service (data loss) via filesystem write operations on a read-only disk that supports the (1) B...
Linux Linux Kernel 3.9.0
Linux Linux Kernel 3.2.21
Linux Linux Kernel 3.4.30
Linux Linux Kernel 3.4.4
Linux Linux Kernel 3.0.25
Linux Linux Kernel 3.1.2
Linux Linux Kernel 3.10.8
Linux Linux Kernel 3.4.11
Linux Linux Kernel 3.0
Linux Linux Kernel 3.2.19
Linux Linux Kernel 3.0.22
Linux Linux Kernel 3.2.23
Linux Linux Kernel 3.4.26
Linux Linux Kernel 3.4.13
Linux Linux Kernel 3.6.7
Linux Linux Kernel 3.8.10
Linux Linux Kernel 3.0.5
Linux Linux Kernel 3.5.2
Linux Linux Kernel 3.2.18
Linux Linux Kernel 3.0.68
Linux Linux Kernel 3.3
Linux Linux Kernel 3.0.38
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »