
CVE-2013-4553 – Debian Security Advisory 3006-1
https://notcve.org/view.php?id=CVE-2013-4553
24 Dec 2013 — The XEN_DOMCTL_getmemlist hypercall in Xen 3.4.x through 4.3.x (possibly 4.3.1) does not always obtain the page_alloc_lock and mm_rwlock in the same order, which allows local guest administrators to cause a denial of service (host deadlock). La hypercall XEN_DOMCTL_getmemlist en Xen 3.4.x a 4.3.x (posiblemente 4.3.1) no obtiene siempre los bloqueos page_alloc_lock y mm_rwlock en el mismo orden, lo cual permite a administradores locales invitados causar denegación de servicio (bloqueo del host). Multiple vul... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-4554 – kernel: xen: hypercalls exposed to privilege rings 1 and 2 of HVM guests
https://notcve.org/view.php?id=CVE-2013-4554
24 Dec 2013 — Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2. Xen 3.0.3 a 4.1.x (posiblemente 4.1.6.1), 4.2.x (posiblemente 4.2.3), y 4.3.x (posiblemente 4.3.1) no previene correctamente acceso a hypercalls, lo cual permite a usuarios invitados locales obtener privilegios a través de la ejecución de una aplicación manipulada en e... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-6400 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2013-6400
13 Dec 2013 — Xen 4.2.x and 4.3.x, when using Intel VT-d and a PCI device has been assigned, does not clear the flag that suppresses IOMMU TLB flushes when unspecified errors occur, which causes the TLB entries to not be flushed and allows local guest administrators to cause a denial of service (host crash) or gain privileges via unspecified vectors. En Xen 4.2.x y 4.3.x, al utilizar Intel VT-d y un dispositivo PCI asignado, no borra el indicador que suprime vocados de IOMMU TLB cuando se producen errores no especificado... • http://lists.fedoraproject.org/pipermail/package-announce/2013-December/125081.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-6375 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2013-6375
23 Nov 2013 — Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter." Xen 4.2.x y 4.3.x, cuando se usa una pasarela Intel VT-d para PCI, no vacía correctamente el TLB después de limpiar una entrada de tabla de traducción presente, lo que permite a administradores locales provocar... • http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-4551 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2013-4551
15 Nov 2013 — Xen 4.2.x and 4.3.x, when nested virtualization is disabled, does not properly check the emulation paths for (1) VMLAUNCH and (2) VMRESUME, which allows local HVM guest users to cause a denial of service (host crash) via unspecified vectors related to "guest VMX instruction execution." Xen 4.2.x y 4.3.x, cuando la virtualización anidada es desactivada, no comprueba correctamente las rutas de emulación para VMLAUNCH y (2) VMRESUME, lo que permite a usuarios HVM locales provocar una denegación de servicio (ci... • http://lists.opensuse.org/opensuse-updates/2013-12/msg00059.html • CWE-20: Improper Input Validation •

CVE-2013-4416 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2013-4416
02 Nov 2013 — The Ocaml xenstored implementation (oxenstored) in Xen 4.1.x, 4.2.x, and 4.3.x allows local guest domains to cause a denial of service (domain shutdown) via a large message reply. La aplicación Ocaml xenstored (oxenstored) en Xen 4.1.x, 4.2.x, y 4.3.x permite dominios locales de clientes provocar una denegación de servicio (dominio apagado) a través de un mensaje grande de respuesta. Multiple vulnerabilities have been found in Xen, the worst of which could lead to arbitrary code execution. Versions less tha... • http://lists.opensuse.org/opensuse-updates/2013-11/msg00009.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-4494 – kernel: xen: Lock order reversal between page allocation and grant table locks
https://notcve.org/view.php?id=CVE-2013-4494
02 Nov 2013 — Xen before 4.1.x, 4.2.x, and 4.3.x does not take the page_alloc_lock and grant_table.lock in the same order, which allows local guest administrators with access to multiple vcpus to cause a denial of service (host deadlock) via unspecified vectors. Xen con versiones enteriores a 4.1.x, 4.2.x, 4.3.x, y no toma la page_alloc_lock grant_table.lock en el mismo orden, lo que permite a los administradores invitados locales con acceso a múltiples vcpus causar una denegación de servicio (bloqueo host) a través sin ... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html • CWE-20: Improper Input Validation •

CVE-2013-4369 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2013-4369
17 Oct 2013 — The xlu_vif_parse_rate function in the libxlu library in Xen 4.2.x and 4.3.x allows local users to cause a denial of service (NULL pointer dereference) by using the "@" character as the VIF rate configuration. La función xlu_vif_parse_rate en la librería libxlu de Xen 4.2.x y 4.3.x permite a usuarios locales causar una denegación de servicio (referencia puntero nulo) utilizando el caracter '@' como configuración de velocidad VIF. Multiple vulnerabilities have been found in Xen, the worst of which could lead... • http://security.gentoo.org/glsa/glsa-201407-03.xml •

CVE-2013-4370 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2013-4370
17 Oct 2013 — The ocaml binding for the xc_vcpu_getaffinity function in Xen 4.2.x and 4.3.x frees certain memory that may still be intended for use, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors that trigger a (1) use-after-free or (2) double free. El enlace ocaml para la función xc_vcpu_getaffinity en Xen 4.2.x y 4.3.x libera cierta memoria que aún podría estar destinada a su utilización, lo que permite a usuarios locales pro... • http://seclists.org/oss-sec/2013/q4/att-61/xsa69.patch • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-4371 – Gentoo Linux Security Advisory 201407-03
https://notcve.org/view.php?id=CVE-2013-4371
17 Oct 2013 — Use-after-free vulnerability in the libxl_list_cpupool function in the libxl toolstack library in Xen 4.2.x and 4.3.x, when running "under memory pressure," returns the original pointer when the realloc function fails, which allows local users to cause a denial of service (heap corruption and crash) and possibly execute arbitrary code via unspecified vectors. Vulnerabilidad de uso después de liberación en la función libxl_list_cpupool de la librería toolstack LibXL en Xen 4.2.x y 4.3.x, cuando se ejecuta "b... • http://security.gentoo.org/glsa/glsa-201407-03.xml • CWE-399: Resource Management Errors •