The do_send and do_recv functions in libvchan in Xen 4.2-4.4 allow local guests to cause denial of service or potentially gain privileges via crafted xenstore ring indexes
Reporter | Title | Published | Views | Family All 74 |
---|---|---|---|---|
![]() | CVE-2014-1896 | 1 Apr 201406:35 | – | debiancve |
![]() | Code injection | 1 Apr 201406:35 | – | prion |
![]() | CVE-2014-1896 | 1 Apr 201400:00 | – | ubuntucve |
![]() | CVE-2014-1896 | 1 Apr 201401:00 | – | cvelist |
![]() | CVE-2014-1896 | 1 Apr 201406:35 | – | cve |
![]() | libvchan failure handling malicious ring indexes | 6 Feb 201412:00 | – | xen |
![]() | Fedora 20 : xen-4.3.1-9.fc20 (2014-2170) | 17 Feb 201400:00 | – | nessus |
![]() | Fedora 19 : xen-4.2.3-15.fc19 (2014-2188) | 17 Feb 201400:00 | – | nessus |
![]() | SuSE 11.3 Security Update : Xen (SAT Patch Number 8973) | 14 Mar 201400:00 | – | nessus |
![]() | openSUSE Security Update : xen (openSUSE-SU-2014:0483-1) | 13 Jun 201400:00 | – | nessus |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo