
CVE-2016-9384 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9384
02 Jan 2017 — Xen 4.7 allows local guest OS users to obtain sensitive host information by loading a 32-bit ELF symbol table. Xen 4.7 permite a usuarios locales de SO huésped obtener información sensible del host cargando una tabla de símbolos 32-bit ELF. Multiple vulnerabilities have been found in Xen, the worst of which could lead to the execution of arbitrary code on the host system. Versions less than 4.7.1-r4 are affected. • http://www.securityfocus.com/bid/94468 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2016-7777 – Gentoo Linux Security Advisory 201611-09
https://notcve.org/view.php?id=CVE-2016-7777
07 Oct 2016 — Xen 4.7.x and earlier does not properly honor CR0.TS and CR0.EM, which allows local x86 HVM guest OS users to read or modify FPU, MMX, or XMM register state information belonging to arbitrary tasks on the guest by modifying an instruction while the hypervisor is preparing to emulate it. Xen 4.7.x y versiones anteriores no respeta adecuadamente CR0.TS y CR0.EM, lo que permite a usuarios locales x86 HVM del SO invitado leer o modificar información del estado de registro FPU, MMX o XMM que pertenece a tareas a... • http://www.securityfocus.com/bid/93344 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2016-7093 – Gentoo Linux Security Advisory 201611-09
https://notcve.org/view.php?id=CVE-2016-7093
21 Sep 2016 — Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation. Xen 4.5.3, 4.6.3 y 4.7.x permiten a administradores locales del SO invitado HVM sobreescribir memoria del hipervisor y consecuentemente obtener privilegios del SO anfitrión aprovechando el mal manejo del truncamiento del puntero de instrucción durante la emulación. Multiple vulnerabilities hav... • http://support.citrix.com/article/CTX216071 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-7094 – Gentoo Linux Security Advisory 201611-09
https://notcve.org/view.php?id=CVE-2016-7094
21 Sep 2016 — Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update. Desbordamiento de búfer en Xen 4.7.x y versiones anteriores permite a administradores locales del SO invitado x86 HVM ejecutado con paginación sombra provocar una denegación de servicio a través de una actualización de tabla de página. Multiple vulnerabilities have been found in Xen, the worst of which allows gaining of privileges on ... • http://support.citrix.com/article/CTX216071 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-6259
https://notcve.org/view.php?id=CVE-2016-6259
02 Aug 2016 — Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check. Xen 4.5.x hasta la version 4.7.x no implementa listas blancas Supervisor Mode Access Prevencion (SMAP) en excepción 32 bits y entrega de eventos, lo que permite a kernels 32-bit PV locales del SO invitado provocar una denegación de servicio (hipe... • http://support.citrix.com/article/CTX214954 • CWE-20: Improper Input Validation •

CVE-2016-6258 – Debian Security Advisory 3633-1
https://notcve.org/view.php?id=CVE-2016-6258
28 Jul 2016 — The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries. El código de tabla de página PV en arch/x86/mm.c en Xen 4.7.x y versiones anteriores permite a administradores 32-bit PV locales del SO invitado obtener privilegios de administrador del SO mediante el aprovechamiento de fast_paths para la actualización de las entradas de la tabla de página. Multiple vulnerabilities ... • http://support.citrix.com/article/CTX214954 • CWE-284: Improper Access Control •