
CVE-2017-10921 – Gentoo Linux Security Advisory 201710-17
https://notcve.org/view.php?id=CVE-2017-10921
05 Jul 2017 — The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 2. La característica de tabla grant en Xen, hasta las versiones 4.8.x, no asegura que se realicen los conteos de tipos suficientes para un mapeo de GNTMAP_device_map y GNTMAP_host_map, lo que permite que los usuarios invi... • http://www.debian.org/security/2017/dsa-3969 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2017-10922 – Gentoo Linux Security Advisory 201710-17
https://notcve.org/view.php?id=CVE-2017-10922
05 Jul 2017 — The grant-table feature in Xen through 4.8.x mishandles MMIO region grant references, which allows guest OS users to cause a denial of service (loss of grant trackability), aka XSA-224 bug 3. La característica de tabla grant en Xen, hasta las versiones 4.8.x, gestiona de manera incorrecta referencias grant de la región MMIO, lo que permite que los usuarios invitados de sistema operativo provoquen una denegación de servicio (pérdida de trazabilidad de grant, también conocido como XSA-224, fallo 3. Multiple v... • http://www.debian.org/security/2017/dsa-3969 • CWE-400: Uncontrolled Resource Consumption •

CVE-2017-8905 – Gentoo Linux Security Advisory 201705-11
https://notcve.org/view.php?id=CVE-2017-8905
11 May 2017 — Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215. Xen hasta la versión 4.6.x para plataformas de 64 bits maneja una llamada de seguridad, lo que podría permitir a los usuarios del sistema operativo huésped PV ejecutar código arbitrario en el sistema anfitrión, también conocido como XSA-215. Multiple vulnerabilities have been found in Xen, the worst of which could allow for privilege escalation. Ver... • http://www.securityfocus.com/bid/98436 • CWE-682: Incorrect Calculation •

CVE-2017-2620 – Qemu: display: cirrus: potential arbitrary code execution via cirrus_bitblt_cputovideo
https://notcve.org/view.php?id=CVE-2017-2620
27 Feb 2017 — Quick emulator (QEMU) before 2.8 built with the Cirrus CLGD 54xx VGA Emulator support is vulnerable to an out-of-bounds access issue. The issue could occur while copying VGA data in cirrus_bitblt_cputovideo. A privileged user inside guest could use this flaw to crash the QEMU process OR potentially execute arbitrary code on host with privileges of the QEMU process. Quick emulator (QEMU) en versiones anteriores a la 2.8 construido con el soporte del emulador Cirrus CLGD 54xx VGA Emulator es vulnerable a un p... • http://rhn.redhat.com/errata/RHSA-2017-0328.html • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •

CVE-2017-2615 – Qemu: display: cirrus: oob access while doing bitblt copy backward mode
https://notcve.org/view.php?id=CVE-2017-2615
21 Feb 2017 — Quick emulator (QEMU) built with the Cirrus CLGD 54xx VGA emulator support is vulnerable to an out-of-bounds access issue. It could occur while copying VGA data via bitblt copy in backward mode. A privileged user inside a guest could use this flaw to crash the QEMU process resulting in DoS or potentially execute arbitrary code on the host with privileges of QEMU process on the host. Quick emulator (QEMU) con soporte integrado para el emulador Cirrus CLGD 54xx VGA es vulnerable a un problema de acceso fuera ... • http://rhn.redhat.com/errata/RHSA-2017-0309.html • CWE-125: Out-of-bounds Read CWE-787: Out-of-bounds Write •

CVE-2016-10025
https://notcve.org/view.php?id=CVE-2016-10025
26 Jan 2017 — VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check. Emulación VMFUNC en Xen 4.6.x hasta la versión 4.8.x en sistemas x86 que usan extensiones de virtualización AMD (también conocidas como SVM) permite a usuarios locales HVM invitados del SO provocar una denegación de servicio (bloqueo del hipervisor) aprovechando una verificación per... • http://www.securityfocus.com/bid/95026 • CWE-476: NULL Pointer Dereference •

CVE-2016-10013 – Debian Security Advisory 3847-1
https://notcve.org/view.php?id=CVE-2016-10013
26 Jan 2017 — Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation. Xen hasta la versión 4.8.x permite a usuarios locales 64-bit x86 HVM invitados del SO obtener privilegios aprovechando el manejo incorrecto de singlestep SYSCALL durante la emulación. Jan Beulich and Jann Horn discovered multiple vulnerabilities in the Xen hypervisor, which may lead to privilege escalation, guest-to-host breakout, denial of service or information ... • http://www.debian.org/security/2017/dsa-3847 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-9377 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9377
02 Jan 2017 — Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation. Xen 4.5.x hasta la versión 4.7.x en sistemas AMD sin la funcionalidad NRip, cuando se emulan instrucciones que generan interrupciones de software, permite a usuarios locales de SO huésped HVM provocar una denegación de servicio (caída del invitado) aprovechando error d... • http://www.securityfocus.com/bid/94475 • CWE-682: Incorrect Calculation •

CVE-2016-9382 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-9382
02 Jan 2017 — Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode. Xen 4.0.x hasta la versión 4.7.x administra mal los conmutadores de tareas x86 para el modo VM86, lo que permite a usuarios locales del SO invitado x86 HVM de 32-bit obtener privilegios o provocar una denegación de... • http://www.securityfocus.com/bid/94470 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-10024 – Gentoo Linux Security Advisory 201612-56
https://notcve.org/view.php?id=CVE-2016-10024
02 Jan 2017 — Xen through 4.8.x allows local x86 PV guest OS kernel administrators to cause a denial of service (host hang or crash) by modifying the instruction stream asynchronously while performing certain kernel operations. Xen hasta la versión 4.8.x permite a administradores del kernel locales x86 PV invitados del SO provocar una denegación de servicio (cuelgue del anfitrión o caída) modificando el flujo de instrucciones asincrónicamente mientras se llevan a cabo ciertas operaciones del kernel. Jan Beulich and Jann ... • http://www.debian.org/security/2017/dsa-3847 • CWE-20: Improper Input Validation •