Количество 14
Количество 14
CVE-2015-7969
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
CVE-2015-7969
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
CVE-2015-7969
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
CVE-2015-7969
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest admin ...
GHSA-fpcv-vm34-hph7
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall.
openSUSE-SU-2015:1965-1
Security update for xen
SUSE-SU-2015:1952-1
Security update for xen
SUSE-SU-2015:1908-1
Security update for xen
SUSE-SU-2015:1894-1
Security update for xen
SUSE-SU-2015:1853-1
Security update for xen
SUSE-SU-2015:2306-1
Security update for xen
SUSE-SU-2015:2326-1
Security update for xen
SUSE-SU-2015:2338-1
Security update for xen
SUSE-SU-2015:2328-1
Security update for xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2015-7969 Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall. | CVSS2: 4.9 | 0% Низкий | больше 10 лет назад | |
CVE-2015-7969 Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall. | 0% Низкий | больше 10 лет назад | ||
CVE-2015-7969 Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall. | CVSS2: 4.9 | 0% Низкий | больше 10 лет назад | |
CVE-2015-7969 Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest admin ... | CVSS2: 4.9 | 0% Низкий | больше 10 лет назад | |
GHSA-fpcv-vm34-hph7 Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall. | 0% Низкий | больше 3 лет назад | ||
openSUSE-SU-2015:1965-1 Security update for xen | больше 10 лет назад | |||
SUSE-SU-2015:1952-1 Security update for xen | больше 10 лет назад | |||
SUSE-SU-2015:1908-1 Security update for xen | больше 10 лет назад | |||
SUSE-SU-2015:1894-1 Security update for xen | больше 10 лет назад | |||
SUSE-SU-2015:1853-1 Security update for xen | больше 10 лет назад | |||
SUSE-SU-2015:2306-1 Security update for xen | около 10 лет назад | |||
SUSE-SU-2015:2326-1 Security update for xen | около 10 лет назад | |||
SUSE-SU-2015:2338-1 Security update for xen | около 10 лет назад | |||
SUSE-SU-2015:2328-1 Security update for xen | около 10 лет назад |
Уязвимостей на страницу