
CVE-2012-5634 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-5634
14 Feb 2013 — Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt. Xen v4.2.x, v4.1.x, y v4.0, cuando usa Intel VT-d para el paso por el PCI, no configura apropiadamente VT-d cuando soporta un dispositivo que esta detrás de un puente PCI heredado, lo que permite a invitados locales causar una denegación de servicio ... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html • CWE-16: Configuration •

CVE-2012-6333 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-6333
13 Dec 2012 — Multiple HVM control operations in Xen 3.4 through 4.2 allow local HVM guest OS administrators to cause a denial of service (physical CPU consumption) via a large input. Varias operaciones de control de HVM en Xen v3.4 hasta la v4.2 permiten a administradores de sistemas operativos invitados locales causar una denegación de servicio (excesivo consumo de CPU física) a través de una entrada de datos demasiado grande. Multiple vulnerabilities have been found in Xen, allowing attackers on a Xen Virtual Machine ... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html • CWE-399: Resource Management Errors •

CVE-2012-5513 – kernel: xen: XENMEM_exchange may overwrite hypervisor memory
https://notcve.org/view.php?id=CVE-2012-5513
13 Dec 2012 — The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range. El manejador XENMEM_exchange en Xen v4.2 y anteriores no comprueba correctamente la dirección de memoria, lo que permite causar una denegación de servicio (caída del S.O.) a administrador de sistemas operativos invitados PV o ... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-5515 – kernel: xen: Several memory hypercall operations allow invalid extent order values
https://notcve.org/view.php?id=CVE-2012-5515
13 Dec 2012 — The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. Las hiperllamadas (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, y (3) XENMEM_exchange en Xen v4.2 y anteriores permiten a los administradores invitados locales causar una denegación de servicio (bucle largo y cuelgue) a través de un valor modificado de "e... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html •

CVE-2012-5510 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-5510
13 Dec 2012 — Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors. Xen v4.x, cuando se baja la versión de la tabla de permisos, no elimina correctamente la página de estado de la lista de seguimiento cuando libera la página, lo que permite causar una denegación de servicio (caída del hipervisor) a los administradores de sis... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html •

CVE-2012-5511 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-5511
13 Dec 2012 — Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image. Desbordamiento de búfer en la funcionalidad "dirty video RAM tracking" en Xen 3.4 a la 4.1, permite a los huespedes HVM administradores del sistema operativo local provocar una denegación de servicio (caída) a través de una imagen bitmap demasiado grande. Multiple vulnerabilities have been found in Xen, allowi... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-5514 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-5514
13 Dec 2012 — The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors. La función guest_physmap_mark_populate_on_demand en Xen v4.2 y anteriores no desbloquea correctamente los GFNs al comprobar si están en uso, lo que permite causar una denegación de servicio (caída del HVM)a los administradores de HVM invitados locales a tra... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html •

CVE-2011-3131 – kernel: xen: IOMMU fault livelock
https://notcve.org/view.php?id=CVE-2011-3131
13 Dec 2012 — Xen 4.1.1 and earlier allows local guest OS kernels with control of a PCI[E] device to cause a denial of service (CPU consumption and host hang) via many crafted DMA requests that are denied by the IOMMU, which triggers a livelock. Xen v4.1.1 y anteriores permite causar una denegación de servicio (consumo de CPU y bloqueo de Xen) a los kernels de sistemas operativos huesped que controlan dispositivos PCI[E] a través de muchas peticiones DMA modificadas que son denegadas por la IOMMU, lo que desencadena un b... • http://old-list-archives.xen.org/archives/html/xen-devel/2011-06/msg01106.html • CWE-399: Resource Management Errors •

CVE-2012-3432 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-3432
03 Dec 2012 — The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions. La función handle_mmio en arch/x86/hvm/io.c en el emulador de operaciones MMIO para Xen v3.3 y v4.x, cuando se ejecuta un HVM huesped, no reinicia correctamente la información de estado ... • http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2012-2934 – kernel: denial of service due to AMD Erratum #121
https://notcve.org/view.php?id=CVE-2012-2934
03 Dec 2012 — Xen 4.0, and 4.1, when running a 64-bit PV guest on "older" AMD CPUs, does not properly protect against a certain AMD processor bug, which allows local guest OS users to cause a denial of service (host hang) via sequential execution of instructions across a non-canonical boundary, a different vulnerability than CVE-2012-0217. Xen v4.0 y v4.1, cuando se ejecuta un cliente PV de 64-bit en CPUs AMD "antiguas", no protege adecuadamente contra un determiando fallo del procesador AMD, lo que permite a usuarios de... • http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html •