Page 15 of 338 results (0.011 seconds)

CVSS: 6.2EPSS: 0%CPEs: 14EXPL: 0

02 Aug 2016 — Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check. Xen 4.5.x hasta la version 4.7.x no implementa listas blancas Supervisor Mode Access Prevencion (SMAP) en excepción 32 bits y entrega de eventos, lo que permite a kernels 32-bit PV locales del SO invitado provocar una denegación de servicio (hipe... • http://support.citrix.com/article/CTX214954 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 0%CPEs: 33EXPL: 0

28 Jul 2016 — The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries. El código de tabla de página PV en arch/x86/mm.c en Xen 4.7.x y versiones anteriores permite a administradores 32-bit PV locales del SO invitado obtener privilegios de administrador del SO mediante el aprovechamiento de fast_paths para la actualización de las entradas de la tabla de página. Multiple vulnerabilities ... • http://support.citrix.com/article/CTX214954 • CWE-284: Improper Access Control •

CVSS: 5.6EPSS: 0%CPEs: 12EXPL: 0

07 Jun 2016 — The p2m_teardown function in arch/arm/p2m.c in Xen 4.4.x through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (NULL pointer dereference and host OS crash) by creating concurrent domains and holding references to them, related to VMID exhaustion. La función p2m_teardown en arch/arm/p2m.c en Xen 4.4.x hasta la versión 4.6.x permite a usuarios locales invitados del SO con acceso al dominio del controlador provocar una denegación de servicio (referencia a punte... • http://www.debian.org/security/2016/dsa-3633 •

CVSS: 6.8EPSS: 0%CPEs: 19EXPL: 0

07 Jun 2016 — The libxl device-handling in Xen 4.6.x and earlier allows local OS guest administrators to cause a denial of service (resource consumption or management facility confusion) or gain host OS privileges by manipulating information in guest controlled areas of xenstore. libxl device-handling en Xen 4.6.x y versiones anteriores permite a administradores locales invitados de SO provocar una denegación de servicio (consumo de recurso o confusión de facilidad de gestión) u obtener privilegios de anfitrión de SO man... • http://www.debian.org/security/2016/dsa-3633 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 4.7EPSS: 0%CPEs: 36EXPL: 0

07 Jun 2016 — The libxl device-handling in Xen through 4.6.x allows local guest OS users with access to the driver domain to cause a denial of service (management tool confusion) by manipulating information in the backend directories in xenstore. El libxl device-handling en Xen hasta la versión 4.6.x permite a usuarios locales del SO invitado con acceso al dominio del controlador provocar una denegación de servicio (confusión de la herramienta de gestión) manipulando información en los directorios del backend en xenstore... • http://www.securitytracker.com/id/1036024 • CWE-284: Improper Access Control •

CVSS: 8.4EPSS: 0%CPEs: 4EXPL: 0

18 May 2016 — The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory. La función guest_walk_tables en arch/x86/mm/guest_walk en Xen 4.6.x y versiones anteriores no maneja adecuadamente el bit de entrada a la tabla de página Page Size (PS) en los niveles de tabla de página L4 y L3, lo que podría permitir a... • http://www.debian.org/security/2016/dsa-3633 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 0

15 Apr 2016 — Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area. Xen y el kernel de Linux hasta la versión 4.5.x no suprime adecuadamente el apoyo hugetlbfs en invitados x86 PV, lo que permite a usuarios PV locales invitados del SO provocar una denegación de servicio (caida de SO invitado) al intentar acceder a un área mapeada hugetlbfs. Justi... • http://www.debian.org/security/2016/dsa-3607 • CWE-20: Improper Input Validation •

CVSS: 3.8EPSS: 0%CPEs: 5EXPL: 0

13 Apr 2016 — The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076. La función xrstor en arch/x86/xstate.c en Xen 4.x no maneja correctamente escrituras al bit FSW.ES hardware cuando se ejecuta en procesador... • http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVSS: 3.8EPSS: 0%CPEs: 9EXPL: 0

13 Apr 2016 — The fpu_fxrstor function in arch/x86/i387.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076. La función fpu_fxrstor en arch/x86/i387.c en Xen 4.x no maneja correctamente escrituras al bit FSW.ES hardware cuando se ejecuta en proc... • http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

12 Apr 2016 — The __switch_to function in arch/x86/kernel/process_64.c in the Linux kernel does not properly context-switch IOPL on 64-bit PV Xen guests, which allows local guest OS users to gain privileges, cause a denial of service (guest OS crash), or obtain sensitive information by leveraging I/O port access. La función __switch_to en arch/x86/kernel/process_64.c en el kernel de Linux no sustituye correctamente el conmutador de contexto IOPL en invitados 64-bit PV Xen, lo que permite a usuarios locales del SO invitad... • http://www.debian.org/security/2016/dsa-3607 • CWE-264: Permissions, Privileges, and Access Controls •