CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
96201 | CVE-2016-9381 | Candidate | Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability. | Assigned (20161117) | None (candidate not yet proposed) | View | |
96202 | CVE-2016-9382 | Candidate | Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. | Assigned (20161117) | None (candidate not yet proposed) | View | |
96203 | CVE-2016-9383 | Candidate | Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions. | Assigned (20161117) | None (candidate not yet proposed) | View | |
96204 | CVE-2016-9384 | Candidate | Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table. | Assigned (20161117) | None (candidate not yet proposed) | View | |
96205 | CVE-2016-9385 | Candidate | The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks. | Assigned (20161117) | None (candidate not yet proposed) | View |
Page 19241 of 20943, showing 5 records out of 104715 total, starting on record 96201, ending on 96205