
CVE-2013-1917 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-1917
19 Apr 2013 — Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction. Xen 3.1 a la 4.x, cuando ejecuta hosts con arquitectura de 64 bits en CPUs Intel, no limpia la bandera NT cuan emplea una IRET después de una instrucción SYSENTER, lo que permite a usuarios PV provocar una denega... • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html • CWE-20: Improper Input Validation •

CVE-2013-1920 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-1920
12 Apr 2013 — Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors. Xen v4.2.x, v4.1.x, y anteriores, cuando el hypervisor se está ejecutando "bajo presión de memoria" y el Módulo de Seguridad Xen (XSM) está activado,... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-0215 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-0215
07 Mar 2013 — oxenstored in Xen 4.1.x, Xen 4.2.x, and xen-unstable does not properly consider the state of the Xenstore ring during read operations, which allows guest OS users to cause a denial of service (daemon crash and host-control outage, or memory consumption) or obtain sensitive control-plane data by leveraging guest administrative access. oxenstored en Xen v4.1.x, Xen v4.2.x, y xen inestable no considera debidamente en cuenta el estado del anillo Xenstore durante las operaciones de lectura, que permite a usuario... • http://openwall.com/lists/oss-security/2013/02/05/10 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-0153 – kernel: xen: interrupt remap entries shared and old ones not cleared on AMD IOMMUs
https://notcve.org/view.php?id=CVE-2013-0153
14 Feb 2013 — The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests. El soporte de Xen para AMD IOMMU en v4.2.x, v4.1.x, v3.3, and otras versiones, cuando usa AMD-Vi para el paso por el PCI, usa la misma tabla para el trazado de interrupciones por el host y los anfitriones, lo que permite a los invitados causa... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html •

CVE-2012-5634 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-5634
14 Feb 2013 — Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt. Xen v4.2.x, v4.1.x, y v4.0, cuando usa Intel VT-d para el paso por el PCI, no configura apropiadamente VT-d cuando soporta un dispositivo que esta detrás de un puente PCI heredado, lo que permite a invitados locales causar una denegación de servicio ... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html • CWE-16: Configuration •

CVE-2012-5511 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-5511
13 Dec 2012 — Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image. Desbordamiento de búfer en la funcionalidad "dirty video RAM tracking" en Xen 3.4 a la 4.1, permite a los huespedes HVM administradores del sistema operativo local provocar una denegación de servicio (caída) a través de una imagen bitmap demasiado grande. Multiple vulnerabilities have been found in Xen, allowi... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-6333 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-6333
13 Dec 2012 — Multiple HVM control operations in Xen 3.4 through 4.2 allow local HVM guest OS administrators to cause a denial of service (physical CPU consumption) via a large input. Varias operaciones de control de HVM en Xen v3.4 hasta la v4.2 permiten a administradores de sistemas operativos invitados locales causar una denegación de servicio (excesivo consumo de CPU física) a través de una entrada de datos demasiado grande. Multiple vulnerabilities have been found in Xen, allowing attackers on a Xen Virtual Machine ... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html • CWE-399: Resource Management Errors •

CVE-2012-5510 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-5510
07 Dec 2012 — Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors. Xen v4.x, cuando se baja la versión de la tabla de permisos, no elimina correctamente la página de estado de la lista de seguimiento cuando libera la página, lo que permite causar una denegación de servicio (caída del hipervisor) a los administradores de sis... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html •

CVE-2012-5515 – kernel: xen: Several memory hypercall operations allow invalid extent order values
https://notcve.org/view.php?id=CVE-2012-5515
07 Dec 2012 — The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value. Las hiperllamadas (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, y (3) XENMEM_exchange en Xen v4.2 y anteriores permiten a los administradores invitados locales causar una denegación de servicio (bucle largo y cuelgue) a través de un valor modificado de "e... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00000.html •

CVE-2012-5514 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-5514
07 Dec 2012 — The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors. La función guest_physmap_mark_populate_on_demand en Xen v4.2 y anteriores no desbloquea correctamente los GFNs al comprobar si están en uso, lo que permite causar una denegación de servicio (caída del HVM)a los administradores de HVM invitados locales a tra... • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html •