
CVE-2016-9932 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9932
02 Jan 2017 — CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix. Emulación CMPXCHG8B en Xen 3.3.x hasta la versión 4.7.x en sistemas x86 permite a usuarios locales HVM invitados del SO obtener información sensible de la memoria basada en pila del anfitrión a través de un prefijo de tamaño de operando "supuestamente ignorado". Jan Beulich and Jann Horn discovered multiple vulner... • http://www.debian.org/security/2017/dsa-3847 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2016-9385 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9385
02 Jan 2017 — The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks. La funcionalidad de emulación de escritura de base de segmento x86 en Xen 4.4.x hasta la versión 4.7.x permite a administradores locales del SO invitado x86 PV provocar una denegación de servicio (caída del host) aprovechando la falta de verificación de direcciones canónicas. Multiple vulnerabilitie... • http://www.securityfocus.com/bid/94472 • CWE-20: Improper Input Validation •

CVE-2016-9818 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9818
02 Jan 2017 — Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at HYP. Xen hasta la versión 4.7.x permite a usuarios locales del SO ARM invitado provocar una denegación de servicio (caída del host) a través de vectores que implican un aborto asíncrono mientras en HYP. Multiple vulnerabilities have been found in Xen, the worst of which could lead to the execution of arbitrary code on the host system. Versions less than 4.7.1-r4 ar... • http://www.openwall.com/lists/oss-security/2016/11/29/3 • CWE-284: Improper Access Control •

CVE-2016-9815 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9815
02 Jan 2017 — Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host panic) by sending an asynchronous abort. Xen hasta la versión 4.7.x permite a usuarios locales del SO ARM invitado provocar una denegación de servicio (pánico del host) enviando un aborto asíncrono. Multiple vulnerabilities have been found in Xen, the worst of which could lead to the execution of arbitrary code on the host system. Versions less than 4.7.1-r4 are affected. • http://www.openwall.com/lists/oss-security/2016/11/29/3 • CWE-284: Improper Access Control •

CVE-2016-9816 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9816
02 Jan 2017 — Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving an asynchronous abort while at EL2. Xen hasta la versión 4.7.x permite a usuarios locales del SO ARM invitado provocar una denegación de servicio (caída del host) a través de vectores que implican un aborto asíncrono mientra en EL2. Multiple vulnerabilities have been found in Xen, the worst of which could lead to the execution of arbitrary code on the host system. Versions less than 4.7.1-r4 are... • http://www.openwall.com/lists/oss-security/2016/11/29/3 • CWE-284: Improper Access Control •

CVE-2016-9378 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9378
02 Jan 2017 — Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery. Xen 4.5.x hasta la versión 4.7.x en sistemas AMD sin la funcionalidad NRip, cuando se emulan instrucciones que generan interrupciones de software, permite a usuarios locales de SO huésped HVM provocar una denegación de servicio (caída del inv... • http://www.securityfocus.com/bid/94475 • CWE-284: Improper Access Control •

CVE-2016-10024 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-10024
02 Jan 2017 — Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations. Xen hasta la versión 4.8.x permite a administradores del kernel locales x86 PV invitados del SO provocar una denegación de servicio (cuelgue del anfitrión o caída) modificando el flujo de instrucciones asincrónicamente mientras se llevan a cabo ciertas operaciones del kernel. Jan Beulich and Jann ... • http://www.debian.org/security/2017/dsa-3847 • CWE-20: Improper Input Validation •

CVE-2016-9382 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9382
02 Jan 2017 — Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. Xen 4.0.x hasta la versión 4.7.x administra mal los conmutadores de tareas x86 para el modo VM86, lo que permite a usuarios locales del SO invitado x86 HVM de 32-bit obtener privilegios o provocar una denegación de... • http://www.securityfocus.com/bid/94470 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-9377 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9377
02 Jan 2017 — Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation. Xen 4.5.x hasta la versión 4.7.x en sistemas AMD sin la funcionalidad NRip, cuando se emulan instrucciones que generan interrupciones de software, permite a usuarios locales de SO huésped HVM provocar una denegación de servicio (caída del invitado) aprovechando error d... • http://www.securityfocus.com/bid/94475 • CWE-682: Incorrect Calculation •

CVE-2016-9817 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9817
02 Jan 2017 — Xen through 4.7.x allows local ARM guest OS users to cause a denial of service (host crash) via vectors involving a (1) data or (2) prefetch abort with the ESR_EL2.EA bit set. Xen hasta la versión 4.7.x permite a usuarios locales del SO ARM invitado provocar una denegación de servicio (caída del host) a través de vectores que implican una interrupción de (1) datos o (2) prefetch con el conjunto de bits ESR_EL2.EA. Multiple vulnerabilities have been found in Xen, the worst of which could lead to the executio... • http://www.openwall.com/lists/oss-security/2016/11/29/3 • CWE-284: Improper Access Control •