
CVE-2014-1895 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2014-1895
01 Apr 2014 — Off-by-one error in the flask_security_avc_cachestats function in xsm/flask/flask_op.c in Xen 4.2.x and 4.3.x, when the maximum number of physical CPUs are in use, allows local users to cause a denial of service (host crash) or obtain sensitive information from hypervisor memory by leveraging a FLASK_AVC_CACHESTAT hypercall, which triggers a buffer over-read. Error de superación de límite (off-by-one) en la función flask_security_avc_cachestats en xsm/flask/flask_op.c en Xen 4.2.x y 4.3.x, cuando el número ... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html • CWE-189: Numeric Errors •

CVE-2014-1896 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2014-1896
01 Apr 2014 — The (1) do_send and (2) do_recv functions in io.c in libvchan in Xen 4.2.x, 4.3.x, and 4.4-RC series allows local guests to cause a denial of service or possibly gain privileges via crafted xenstore ring indexes, which triggers a "read or write past the end of the ring." Las funciones (1) do_send y (2) do_recv en io.c in libvchan en Xen 4.2.x, 4.3.x y series 4.4-RC permiten a invitados locales causar una denegación de servicio o posiblemente ganar privilegios a través de indices de anillo xenstore manipulad... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html • CWE-20: Improper Input Validation •

CVE-2014-1891 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2014-1891
01 Apr 2014 — Multiple integer overflows in the (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER, and (4) FLASK_CONTEXT_TO_SID suboperations in the flask hypercall in Xen 4.3.x, 4.2.x, 4.1.x, 3.2.x, and earlier, when XSM is enabled, allow local users to cause a denial of service (processor fault) via unspecified vectors, a different vulnerability than CVE-2014-1892, CVE-2014-1893, and CVE-2014-1894. Múltiples desbordamiento de enteros en las suboperaciones (1) FLASK_GETBOOL, (2) FLASK_SETBOOL, (3) FLASK_USER y (4) FL... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html • CWE-189: Numeric Errors •

CVE-2014-2599 – Debian Security Advisory 3006-1
https://notcve.org/view.php?id=CVE-2014-2599
28 Mar 2014 — The HVMOP_set_mem_access HVM control operations in Xen 4.1.x for 32-bit and 4.1.x through 4.4.x for 64-bit allow local guest administrators to cause a denial of service (CPU consumption) by leveraging access to certain service domains for HVM guests and a large input. Las operaciones de control de HVM HVMOP_set_mem_access en Xen 4.1.x para 32 bits y 4.1.x hasta 4.4.x para 64 bits permiten a administradores locales invitados causar una denegación de servicio (consumo de CPU) mediante el aprovechamiento del a... • http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html • CWE-20: Improper Input Validation •

CVE-2014-1950 – Debian Security Advisory 3006-1
https://notcve.org/view.php?id=CVE-2014-1950
14 Feb 2014 — Use-after-free vulnerability in the xc_cpupool_getinfo function in Xen 4.1.x through 4.3.x, when using a multithreaded toolstack, does not properly handle a failure by the xc_cpumap_alloc function, which allows local users with access to management functions to cause a denial of service (heap corruption) and possibly gain privileges via unspecified vectors. Vulnerabilidad de uso después de liberación en la función xc_cpupool_getinfo en Xen 4.1.x hasta 4.3.x, cuando hace uso de un toolstack con múltiples hil... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html • CWE-399: Resource Management Errors •

CVE-2014-1642 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2014-1642
26 Jan 2014 — The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free. La configuración de IRQ en Xen 4.2.x y 4.3.x, utilizando passthrough de dispositivos y con... • http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127580.html • CWE-399: Resource Management Errors •

CVE-2014-1666 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2014-1666
26 Jan 2014 — The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service (host or guest malfunction) or possibly gain privileges via unspecified vectors. La función do_physdev_op en Xen 4.1.5, 4.1.6.1, 4.2.2 hasta 4.2.3 y 4.3.x no restringe adecuadamente el acceso a las operaciones: (1) PHYSDEVOP_release_msix y (2) PHYSDEVOP_prepare_... • http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127580.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-4375 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2013-4375
19 Jan 2014 — The qdisk PV disk backend in qemu-xen in Xen 4.2.x and 4.3.x before 4.3.1, and qemu 1.1 and other versions, allows local HVM guests to cause a denial of service (domain grant reference consumption) via unspecified vectors. El backend PV qdisk en qemu-xen de Xen 4.2.x y 4.3.x anteriores a 4.3.1, y qemu 1.1 y otras versiones, permite a invitados locales HVM causar una denegación de servicio (consumo de referencia de concesión de dominio) a través de vectores no especificados. Asias He discovered that QEMU inc... • http://security.gentoo.org/glsa/glsa-201407-03.xml • CWE-399: Resource Management Errors •

CVE-2013-4554 – kernel: xen: hypercalls exposed to privilege rings 1 and 2 of HVM guests
https://notcve.org/view.php?id=CVE-2013-4554
24 Dec 2013 — Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2. Xen 3.0.3 a 4.1.x (posiblemente 4.1.6.1), 4.2.x (posiblemente 4.2.3), y 4.3.x (posiblemente 4.3.1) no previene correctamente acceso a hypercalls, lo cual permite a usuarios invitados locales obtener privilegios a través de la ejecución de una aplicación manipulada en e... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-4553 – Debian Security Advisory 3006-1
https://notcve.org/view.php?id=CVE-2013-4553
24 Dec 2013 — The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock). La hypercall XEN_DOMCTL_getmemlist en Xen 3.4.x a 4.3.x (posiblemente 4.3.1) no obtiene siempre los bloqueos page_alloc_lock y mm_rwlock en el mismo orden, lo cual permite a administradores locales invitados causar denegación de servicio (bloqueo del host). Multiple vul... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •