
CVE-2015-7969 – Debian Security Advisory 3414-1
https://notcve.org/view.php?id=CVE-2015-7969
30 Oct 2015 — Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall. Fugas de memoria múltiples en Xen 4.0 hasta la versión 4.6.x permite a administradores local... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-399: Resource Management Errors •

CVE-2015-7971 – Debian Security Advisory 3414-1
https://notcve.org/view.php?id=CVE-2015-7971
30 Oct 2015 — Xen 3.2.x through 4.6.x does not limit the number of printk console messages when logging certain pmu and profiling hypercalls, which allows local guests to cause a denial of service via a sequence of crafted (1) HYPERCALL_xenoprof_op hypercalls, which are not properly handled in the do_xenoprof_op function in common/xenoprof.c, or (2) HYPERVISOR_xenpmu_op hypercalls, which are not properly handled in the do_xenpmu_op function in arch/x86/cpu/vpmu.c. Xen 3.2.x hasta la versión 4.6.x no limita el número de m... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-19: Data Processing Errors •

CVE-2015-7972 – Debian Security Advisory 3414-1
https://notcve.org/view.php?id=CVE-2015-7972
30 Oct 2015 — The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure." La función (1) libxl_set_memory_target en tools/libxl/libxl.c y (2) libxl__build_post en tools/libxl/libxl_dom.c en Xen 3.4.x hast... • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html • CWE-399: Resource Management Errors •