
CVE-2013-2196 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-2196
23 Aug 2013 — Multiple unspecified vulnerabilities in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel, related to "other problems" that are not CVE-2013-2194 or CVE-2013-2195. Múltiples vulnerabilidades no especificadas en Elf parser (libelf) en Xen v4.2.x y anteriores permite a los administradores invitados locales con ciertos permisos, tener un impacto no especificado a través de un kernel hecho manipulado, en ... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html •

CVE-2013-2194 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-2194
23 Aug 2013 — Multiple integer overflows in the Elf parser (libelf) in Xen 4.2.x and earlier allow local guest administrators with certain permissions to have an unspecified impact via a crafted kernel. Múltiples desbordamientos de enteros en el analizador ELF (libelf) en Xen v4.2.x y anteriores permite a los administradores invitados locales con ciertos permisos, tener un impacto no especificado a través de un kernel hecho manipulado. Multiple vulnerabilities have been found in Xen, allowing attackers on a Xen Virtual M... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html • CWE-189: Numeric Errors •

CVE-2013-2078 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-2078
14 Aug 2013 — Xen 4.0.2 through 4.0.4, 4.1.x, and 4.2.x allows local PV guest users to cause a denial of service (hypervisor crash) via certain bit combinations to the XSETBV instruction. Xen v4.0.2 hasta v4.0.4, v4.1.x, y v4.2.x permite a los usuarios locales PV invitados causar una denegación de servicio (caída del hipervisor) mediante ciertas combinaciones de bits de la instrucción XSETBV. Multiple vulnerabilities have been found in Xen, allowing attackers on a Xen Virtual Machine to execute arbitrary code, cause Deni... • http://secunia.com/advisories/55082 • CWE-20: Improper Input Validation •

CVE-2013-1917 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-1917
13 May 2013 — Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction. Xen 3.1 a la 4.x, cuando ejecuta hosts con arquitectura de 64 bits en CPUs Intel, no limpia la bandera NT cuan emplea una IRET después de una instrucción SYSENTER, lo que permite a usuarios PV provocar una denega... • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html • CWE-20: Improper Input Validation •

CVE-2013-1918 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-1918
13 May 2013 — Certain page table manipulation operations in Xen 4.1.x, 4.2.x, and earlier are not preemptible, which allows local PV kernels to cause a denial of service via vectors related to "deep page table traversal." Determinadas operaciones de manipulación de tablas en Xen 4.1.x, 4.2.x y anteriores, permite a kernels PV locales provocar una denegación de servicio a través de vectores relacionados con "deep page table traversal." Multiple vulnerabilities have been found in Xen, allowing attackers on a Xen Virtual Ma... • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105533.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2013-1922 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-1922
13 May 2013 — qemu-nbd in QEMU, as used in Xen 4.2.x, determines the format of a raw disk image based on the header, which allows local guest OS administrators to read arbitrary files on the host by modifying the header to identify a different format, which is used when the guest is restarted, a different vulnerability than CVE-2008-2004. qemu-nbd en QEMU, tal como se utiliza en Xen v4.2.x, determina el formato de una imagen de disco en bruto basada en la cabecera, que permite a los administradores locales de sistema ope... • http://lists.fedoraproject.org/pipermail/package-announce/2013-April/103621.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-1919 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-1919
13 May 2013 — Xen 4.2.x and 4.1.x does not properly restrict access to IRQs, which allows local stub domain clients to gain access to IRQs and cause a denial of service via vectors related to "passed-through IRQs or PCI devices." Xen 4.2.x y 4.1.x no restringe adecuadamente el acceso a las IRQs, lo que permite a clientes locales del subdominio obtener acceso a IRQs y provocar una denegación de servicio a través de vectores relacionados con "dispositivos PCI o passed-through IRQs". Multiple vulnerabilities have been found... • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/104537.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-1952 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-1952
13 May 2013 — Xen 4.x, when using Intel VT-d for a bus mastering capable PCI device, does not properly check the source when accessing a bridge device's interrupt remapping table entries for MSI interrupts, which allows local guest domains to cause a denial of service (interrupt injection) via unspecified vectors. Xen 4.x, cuando utiliza Intel VT-d para un bus capaz de dominar un dispositivo PCI, no comprueba correctamente la fuente de acceso a una interrupción de entradas en la tabla de resignación para MSI de dispositi... • http://lists.fedoraproject.org/pipermail/package-announce/2013-May/105533.html • CWE-20: Improper Input Validation •

CVE-2013-1920 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-1920
12 Apr 2013 — Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors. Xen v4.2.x, v4.1.x, y anteriores, cuando el hypervisor se está ejecutando "bajo presión de memoria" y el Módulo de Seguridad Xen (XSM) está activado,... • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00015.html • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2013-0151 – Gentoo Linux Security Advisory 201309-24
https://notcve.org/view.php?id=CVE-2013-0151
07 Mar 2013 — The do_hvm_op function in xen/arch/x86/hvm/hvm.c in Xen 4.2.x on the x86_32 platform does not prevent HVM_PARAM_NESTEDHVM (aka nested virtualization) operations, which allows guest OS users to cause a denial of service (long-duration page mappings and host OS crash) by leveraging administrative access to an HVM guest in a domain with a large number of VCPUs. La función en xen/arch/x86/hvm/hvm.c en Xen v4.2.x en la plataforma x86_32 no previenen operaciones HVM_PARAM_NESTEDHVM (también conocido como virtuali... • http://openwall.com/lists/oss-security/2013/01/22/10 • CWE-264: Permissions, Privileges, and Access Controls •