
CVE-2016-7094 – Gentoo Linux Security Advisory 201611-09
https://notcve.org/view.php?id=CVE-2016-7094
21 Sep 2016 — Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update. Desbordamiento de búfer en Xen 4.7.x y versiones anteriores permite a administradores locales del SO invitado x86 HVM ejecutado con paginación sombra provocar una denegación de servicio a través de una actualización de tabla de página. Multiple vulnerabilities have been found in Xen, the worst of which allows gaining of privileges on ... • http://support.citrix.com/article/CTX216071 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-6258 – Debian Security Advisory 3633-1
https://notcve.org/view.php?id=CVE-2016-6258
28 Jul 2016 — The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries. El código de tabla de página PV en arch/x86/mm.c en Xen 4.7.x y versiones anteriores permite a administradores 32-bit PV locales del SO invitado obtener privilegios de administrador del SO mediante el aprovechamiento de fast_paths para la actualización de las entradas de la tabla de página. Multiple vulnerabilities ... • http://support.citrix.com/article/CTX214954 • CWE-284: Improper Access Control •

CVE-2016-4480 – Debian Security Advisory 3633-1
https://notcve.org/view.php?id=CVE-2016-4480
18 May 2016 — The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory. La función guest_walk_tables en arch/x86/mm/guest_walk en Xen 4.6.x y versiones anteriores no maneja adecuadamente el bit de entrada a la tabla de página Page Size (PS) en los niveles de tabla de página L4 y L3, lo que podría permitir a... • http://www.debian.org/security/2016/dsa-3633 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-3961 – Ubuntu Security Notice USN-3002-1
https://notcve.org/view.php?id=CVE-2016-3961
15 Apr 2016 — Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area. Xen y el kernel de Linux hasta la versión 4.5.x no suprime adecuadamente el apoyo hugetlbfs en invitados x86 PV, lo que permite a usuarios PV locales invitados del SO provocar una denegación de servicio (caida de SO invitado) al intentar acceder a un área mapeada hugetlbfs. Justi... • http://www.debian.org/security/2016/dsa-3607 • CWE-20: Improper Input Validation •

CVE-2016-3158 – Debian Security Advisory 3554-1
https://notcve.org/view.php?id=CVE-2016-3158
13 Apr 2016 — The xrstor function in arch/x86/xstate.c in Xen 4.x does not properly handle writes to the hardware FSW.ES bit when running on AMD64 processors, which allows local guest OS users to obtain sensitive register content information from another guest by leveraging pending exception and mask bits. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-2076. La función xrstor en arch/x86/xstate.c en Xen 4.x no maneja correctamente escrituras al bit FSW.ES hardware cuando se ejecuta en procesador... • http://lists.fedoraproject.org/pipermail/package-announce/2016-April/181699.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor CWE-284: Improper Access Control •

CVE-2015-8554 – Gentoo Linux Security Advisory 201604-03
https://notcve.org/view.php?id=CVE-2015-8554
06 Apr 2016 — Buffer overflow in hw/pt-msi.c in Xen 4.6.x and earlier, when using the qemu-xen-traditional (aka qemu-dm) device model, allows local x86 HVM guest administrators to gain privileges by leveraging a system with access to a passed-through MSI-X capable physical PCI device and MSI-X table entries, related to a "write path." Desbordamiento de buffer en hw/pt-msi.c en Xen 4.6.x y versiones anteriores, cuando se utiliza el modelo de dispositivo qemu-xen-traditional (también conocido como qemu-dm), permite a admin... • http://support.citrix.com/article/CTX203879 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-2270 – Debian Security Advisory 3519-1
https://notcve.org/view.php?id=CVE-2016-2270
19 Feb 2016 — Xen 4.6.x and earlier allows local guest administrators to cause a denial of service (host reboot) via vectors related to multiple mappings of MMIO pages with different cachability settings. Xen 4.6.x y versiones anteriores permite a administradores invitados locales provocar una denegación de servicio (reinicio de host) a través de vectores relacionados con múltiples mapeos de páginas MMIO con diferentes ajustes de cacheado. Multiple security issues have been found in the Xen virtualisation solution, which... • http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177990.html • CWE-20: Improper Input Validation •

CVE-2016-1570 – Debian Security Advisory 3519-1
https://notcve.org/view.php?id=CVE-2016-1570
22 Jan 2016 — The PV superpage functionality in arch/x86/mm.c in Xen 3.4.0, 3.4.1, and 4.1.x through 4.6.x allows local PV guests to obtain sensitive information, cause a denial of service, gain privileges, or have unspecified other impact via a crafted page identifier (MFN) to the (1) MMUEXT_MARK_SUPER or (2) MMUEXT_UNMARK_SUPER sub-op in the HYPERVISOR_mmuext_op hypercall or (3) unknown vectors related to page table updates. La funcionalidad superpage PV en arch/x86/mm.c en Xen 3.4.0, 3.4.1 y 4.1.x hasta la versión 4.6... • http://www.debian.org/security/2016/dsa-3519 • CWE-20: Improper Input Validation •

CVE-2016-1571 – Debian Security Advisory 3519-1
https://notcve.org/view.php?id=CVE-2016-1571
22 Jan 2016 — The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check. La función paging_invlpg en include/asm-x86/paging.h en Xen 3.3.x hasta la versión 4.6.x, cuando se utiliza paginación en modo shadow o la virtualización anidada está habilitada, permite a us... • http://support.citrix.com/article/CTX205496 • CWE-17: DEPRECATED: Code •

CVE-2015-8552 – Ubuntu Security Notice USN-2846-1
https://notcve.org/view.php?id=CVE-2015-8552
20 Dec 2015 — The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks." El controlador backend PCI en Xen, cuando se ejecuta en un sistema x86 y utiliza Lin... • http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html • CWE-20: Improper Input Validation •