
CVE-2012-3515 – qemu: VT100 emulation vulnerability
https://notcve.org/view.php?id=CVE-2012-3515
23 Nov 2012 — Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space." Qemu, tal como se utiliza en Xen v4.0, v4.1 y posiblemente otros productos, al emular ciertos dispositivos con una consola virtual, permite a los usuarios locales del SO invitado obtener privilegios a través de una secuencia VT100 de escape m... • http://git.qemu.org/?p=qemu-stable-0.15.git%3Ba=log • CWE-20: Improper Input Validation CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2012-6036 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-6036
23 Nov 2012 — The (1) memc_save_get_next_page, (2) tmemc_restore_put_page and (3) tmemc_restore_flush_page functions in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 do not check for negative id pools, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or possibly execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others. Las funcion... • http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2012-6035 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-6035
23 Nov 2012 — The do_tmem_destroy_pool function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly validate pool ids, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others. La función do_tmem_destroy_pool en la Transcendent Memory (TMEM) en Xen v4.0, v4.1, y v4... • http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html • CWE-20: Improper Input Validation •

CVE-2012-3496 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-3496
23 Nov 2012 — XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand. XENMEM_populate_physmap en Xen v4.0, v4.1, y v4.2, y Citrix XenServer v6.0.2 y anteriores, cuando el modo de traducción de página no se utiliza, permite a los kernels locales PV del SO invitado causar una denegación de servicio (caída d... • http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html • CWE-16: Configuration •

CVE-2012-3497 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-3497
23 Nov 2012 — (1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS and (4) TMEMC_SAVE_END in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (NULL pointer dereference or memory corruption and host crash) or possibly have other unspecified impacts via a NULL client id. (1) TMEMC_SAVE_GET_CLIENT_WEIGHT, (2) TMEMC_SAVE_GET_CLIENT_CAP, (3) TMEMC_SAVE_GET_CLIENT_FLAGS y (4) TMEMC_SAVE_END en el Transcendent Memory (TMEM... • http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html • CWE-20: Improper Input Validation •

CVE-2012-4537 – kernel: xen: Memory mapping failure can crash Xen
https://notcve.org/view.php?id=CVE-2012-4537
21 Nov 2012 — Xen 3.4 through 4.2, and possibly earlier versions, does not properly synchronize the p2m and m2p tables when the set_p2m_entry function fails, which allows local HVM guest OS administrators to cause a denial of service (memory consumption and assertion failure), aka "Memory mapping failure DoS vulnerability." Xen v3.4 hasta v4.2 y posiblemente versiones anteriores, no sincroniza correctamente las tablas p2m y m2p cuando la función set_p2m_entry falla, lo que permite a los administradores de sistemas operat... • http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html • CWE-16: Configuration •

CVE-2012-4535 – kernel: xen: VCPU timer overflow leads to PCPU deadlock and host death-by-watchdog
https://notcve.org/view.php?id=CVE-2012-4535
21 Nov 2012 — Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline." Xen 3.4 hasta 4.2 y posiblemente versiones anteriores permite a los administradores de sistemas operativos clientes locales causar una denegación de servicio (bucle infinito en Xen y consumo de CPU física), configurando un VCPU con una "fecha límite inapropiada". Multiple vulnerabilities have... • http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html • CWE-399: Resource Management Errors •

CVE-2012-4539 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2012-4539
21 Nov 2012 — Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability." Xen 4.0 hasta 4.2, al ejecutar clientes 32-bit x86 PV en hipervisores 64-bit, permite a los administradores locales del sistema operativo cliente causar una denegación de servicio (bucle infinito y cuelgue o caída) a tra... • http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html • CWE-399: Resource Management Errors •

CVE-2012-4544 – xen: Xen domain builder Out-of-memory due to malicious kernel/ramdisk
https://notcve.org/view.php?id=CVE-2012-4544
31 Oct 2012 — The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk. El PV domain builder en Xen 4.2 y anteriores, no valida el tamaño del kernel o del ramdisk(1) antes o (2) después de la descompresión, lo que permite a administradores locales de los sistemas huésped provocar una denegación de servicio ... • http://lists.fedoraproject.org/pipermail/package-announce/2012-November/091832.html • CWE-20: Improper Input Validation •

CVE-2012-0217 – FreeBSD - Intel SYSRET Privilege Escalation
https://notcve.org/view.php?id=CVE-2012-0217
12 Jun 2012 — The x86-64 kernel system-call functionality in Xen 4.1.2 and earlier, as used in Citrix XenServer 6.0.2 and earlier and other products; Oracle Solaris 11 and earlier; illumos before r13724; Joyent SmartOS before 20120614T184600Z; FreeBSD before 9.0-RELEASE-p3; NetBSD 6.0 Beta and earlier; Microsoft Windows Server 2008 R2 and R2 SP1 and Windows 7 Gold and SP1; and possibly other operating systems, when running on an Intel processor, incorrectly uses the sysret path in cases where a certain address is not a c... • https://packetstorm.news/files/id/152001 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •