
CVE-2015-8552 – Ubuntu Security Notice USN-2846-1
https://notcve.org/view.php?id=CVE-2015-8552
20 Dec 2015 — The PCI backend driver in Xen, when running on an x86 system and using Linux 3.1.x through 4.3.x as the driver domain, allows local guest administrators to generate a continuous stream of WARN messages and cause a denial of service (disk consumption) by leveraging a system with access to a passed-through MSI or MSI-X capable physical PCI device and XEN_PCI_OP_enable_msi operations, aka "Linux pciback missing sanity checks." El controlador backend PCI en Xen, cuando se ejecuta en un sistema x86 y utiliza Lin... • http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html • CWE-20: Improper Input Validation •

CVE-2015-8338 – Debian Security Advisory 3633-1
https://notcve.org/view.php?id=CVE-2015-8338
17 Dec 2015 — Xen 4.6.x and earlier does not properly enforce limits on page order inputs for the (1) XENMEM_increase_reservation, (2) XENMEM_populate_physmap, (3) XENMEM_exchange, and possibly other HYPERVISOR_memory_op suboperations, which allows ARM guest OS administrators to cause a denial of service (CPU consumption, guest reboot, or watchdog timeout and host reboot) and possibly have unspecified other impact via unknown vectors. Xen 4.6.x y versiones anteriores no impone adecuadamente límites en órdenes de entrada ... • http://www.debian.org/security/2016/dsa-3633 • CWE-254: 7PK - Security Features •

CVE-2015-8339 – Debian Security Advisory 3519-1
https://notcve.org/view.php?id=CVE-2015-8339
17 Dec 2015 — The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly hand back pages to a domain, which might allow guest OS administrators to cause a denial of service (host crash) via unspecified vectors related to domain teardown. La función memory_exchange en common/memory.c en Xen 3.2.x hasta la versión 4.6.x no devuelve adecuadamente páginas a un dominio, lo que podría permitir a administradores invitados del SO causar una denegación de servicio (caída del host) a través de vec... • http://support.citrix.com/article/CTX203451 • CWE-19: Data Processing Errors •

CVE-2015-8340 – Debian Security Advisory 3519-1
https://notcve.org/view.php?id=CVE-2015-8340
17 Dec 2015 — The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling. La función memory_exchange en common/memory.c en Xen 3.2.x hasta la versión 4.6.x no devuelve adecuadamente páginas a un dominio, lo que podría permitir a administradores invitados del SO causar una denegación de servicio (interbloqueo o ca... • http://support.citrix.com/article/CTX203451 • CWE-17: DEPRECATED: Code •

CVE-2015-7814 – Debian Security Advisory 3414-1
https://notcve.org/view.php?id=CVE-2015-7814
30 Oct 2015 — Race condition in the relinquish_memory function in arch/arm/domain.c in Xen 4.6.x and earlier allows local domains with partial management control to cause a denial of service (host crash) via vectors involving the destruction of a domain and using XENMEM_decrease_reservation to reduce the memory of the domain. Condición de carrera en la función relinquish_memory en arch/arm/domain.c en Xen 4.6.x y versiones anteriores permite a dominios locales con control parcial de la gestión provocar una denegación de ... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2015-7835 – Debian Security Advisory 3390-1
https://notcve.org/view.php?id=CVE-2015-7835
30 Oct 2015 — The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping. La función mod_l2_entry en arch/x86/mm.c en Xen 3.4 hasta la versión 4.6.x no valida correctamente las entradas de la tabla de paginación de nivel 2, lo que permite a administradores invitados PV locales obtener privilegios a través de un mapeo de superpage manipulado. It was discovered that t... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-20: Improper Input Validation CWE-264: Permissions, Privileges, and Access Controls •

CVE-2015-7969 – Debian Security Advisory 3414-1
https://notcve.org/view.php?id=CVE-2015-7969
30 Oct 2015 — Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall. Fugas de memoria múltiples en Xen 4.0 hasta la versión 4.6.x permite a administradores local... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-399: Resource Management Errors •

CVE-2015-7970 – Debian Security Advisory 3414-1
https://notcve.org/view.php?id=CVE-2015-7970
30 Oct 2015 — The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand. La función p2m_pod_emergency_sweep en arch/x86/mm/p2m-pod.c en Xen 3.4.x, 3.5,x y 3.6.x no es preferente, lo que permite a administradores invitados x86 HVM locales provocar una d... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-399: Resource Management Errors •

CVE-2015-7971 – Debian Security Advisory 3414-1
https://notcve.org/view.php?id=CVE-2015-7971
30 Oct 2015 — Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c. Xen 3.2.x hasta la versión 4.6.x no limita el número de m... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-19: Data Processing Errors •

CVE-2015-7972 – Debian Security Advisory 3414-1
https://notcve.org/view.php?id=CVE-2015-7972
30 Oct 2015 — The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure." La función (1) libxl_set_memory_target en tools/libxl/libxl.c y (2) libxl__build_post en tools/libxl/libxl_dom.c en Xen 3.4.x hast... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-399: Resource Management Errors •