Show filters
555 Total Results
Displaying 331-340 of 555
Sort by:
Attacker Value
Unknown
CVE-2016-7093
Disclosure Date: September 21, 2016 (last updated November 25, 2024)
Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.
0
Attacker Value
Unknown
CVE-2016-6258
Disclosure Date: August 02, 2016 (last updated November 25, 2024)
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
0
Attacker Value
Unknown
CVE-2016-6259
Disclosure Date: August 02, 2016 (last updated November 25, 2024)
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
0
Attacker Value
Unknown
CVE-2016-4962
Disclosure Date: June 07, 2016 (last updated November 25, 2024)
The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore.
0
Attacker Value
Unknown
CVE-2016-4963
Disclosure Date: June 07, 2016 (last updated November 25, 2024)
The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore.
0
Attacker Value
Unknown
CVE-2016-5242
Disclosure Date: June 07, 2016 (last updated November 25, 2024)
The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding references to them, related to VMID exhaustion.
0
Attacker Value
Unknown
CVE-2014-3672
Disclosure Date: May 25, 2016 (last updated November 25, 2024)
The qemu implementation in libvirt before 1.3.0 and Xen allows local guest OS users to cause a denial of service (host disk consumption) by writing to stdout or stderr.
0
Attacker Value
Unknown
CVE-2016-4480
Disclosure Date: May 18, 2016 (last updated November 25, 2024)
The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.
0
Attacker Value
Unknown
CVE-2016-3960
Disclosure Date: April 19, 2016 (last updated November 25, 2024)
Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
0
Attacker Value
Unknown
CVE-2016-3961
Disclosure Date: April 15, 2016 (last updated November 25, 2024)
Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.
0