CVE-2016-3159
- EPSS 0.04%
- Veröffentlicht 13.04.2016 16:59:19
- Zuletzt bearbeitet 12.04.2025 10:46:40
The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest ...
CVE-2016-3158
- EPSS 0.04%
- Veröffentlicht 13.04.2016 16:59:18
- Zuletzt bearbeitet 12.04.2025 10:46:40
The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by ...
CVE-2015-8555
- EPSS 0.55%
- Veröffentlicht 13.04.2016 15:59:08
- Zuletzt bearbeitet 12.04.2025 10:46:40
Xen 4.6.x, 4.5.x, 4.4.x, 4.3.x, and earlier do not initialize x86 FPU stack and XMM registers when XSAVE/XRSTOR are not used to manage guest extended register state, which allows local guest domains to obtain sensitive information from other domains ...
CVE-2015-8553
- EPSS 0.27%
- Veröffentlicht 13.04.2016 15:59:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
Xen allows guest OS users to obtain sensitive information from uninitialized locations in host OS kernel memory by not enabling memory and I/O decoding control bits. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-0777.
CVE-2015-8552
- EPSS 0.16%
- Veröffentlicht 13.04.2016 15:59:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption)...
CVE-2016-3157
- EPSS 0.36%
- Veröffentlicht 12.04.2016 16:59:02
- Zuletzt bearbeitet 12.04.2025 10:46:40
The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain se...
CVE-2016-2271
- EPSS 0.07%
- Veröffentlicht 19.02.2016 16:59:01
- Zuletzt bearbeitet 12.04.2025 10:46:40
VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
CVE-2016-2270
- EPSS 0.3%
- Veröffentlicht 19.02.2016 16:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings.
CVE-2016-1571
- EPSS 0.3%
- Veröffentlicht 22.01.2016 15:59:06
- Zuletzt bearbeitet 12.04.2025 10:46:40
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest add...
CVE-2016-1570
- EPSS 0.2%
- Veröffentlicht 22.01.2016 15:59:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page ident...