Show filters
555 Total Results
Displaying 341-350 of 555
Sort by:
Attacker Value
Unknown
CVE-2015-8554
Disclosure Date: April 14, 2016 (last updated November 25, 2024)
Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path."
0
Attacker Value
Unknown
CVE-2015-8550
Disclosure Date: April 14, 2016 (last updated November 25, 2024)
Xen, when used on a system providing PV backends, allows local guest OS administrators to cause a denial of service (host OS crash) or gain privileges by writing to memory shared between the frontend and backend, aka a double fetch vulnerability.
0
Attacker Value
Unknown
CVE-2016-3159
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
0
Attacker Value
Unknown
CVE-2016-3158
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076.
0
Attacker Value
Unknown
CVE-2015-8552
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks."
0
Attacker Value
Unknown
CVE-2015-8553
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
0
Attacker Value
Unknown
CVE-2015-8555
Disclosure Date: April 13, 2016 (last updated November 25, 2024)
Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains via unspecified vectors.
0
Attacker Value
Unknown
CVE-2016-3157
Disclosure Date: April 12, 2016 (last updated November 25, 2024)
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access.
0
Attacker Value
Unknown
CVE-2016-2270
Disclosure Date: February 19, 2016 (last updated November 25, 2024)
Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
0
Attacker Value
Unknown
CVE-2016-2271
Disclosure Date: February 19, 2016 (last updated November 25, 2024)
VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
0