CVE List

Id CVE No. Status Description Phase Votes Comments Actions
96201  CVE-2016-9381  Candidate  Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.  Assigned (20161117)  None (candidate not yet proposed)    View
96202  CVE-2016-9382  Candidate  Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.  Assigned (20161117)  None (candidate not yet proposed)    View
96203  CVE-2016-9383  Candidate  Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.  Assigned (20161117)  None (candidate not yet proposed)    View
96204  CVE-2016-9384  Candidate  Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table.  Assigned (20161117)  None (candidate not yet proposed)    View
96205  CVE-2016-9385  Candidate  The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.  Assigned (20161117)  None (candidate not yet proposed)    View

Page 19241 of 20943, showing 5 records out of 104715 total, starting on record 96201, ending on 96205

Actions