CVE-2007-5907 – kernel-xen 3.1.1 does not prevent modification of the CR4 TSC from applications (DoS possible)
https://notcve.org/view.php?id=CVE-2007-5907
Xen 3.1.1 does not prevent modification of the CR4 TSC from applications, which allows pv guests to cause a denial of service (crash). El Xen 3.1.1 no previene la modificación del CR4 TSC para aplicaciones, lo que permite a invitados pv provocar una denegación de servicio (caída). • http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html http://lists.xensource.com/archives/html/xen-devel/2007-10/msg00932.html http://secunia.com/advisories/28405 http://secunia.com/advisories/28412 http://secunia.com/advisories/28636 http://secunia.com/advisories/32485 http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.redhat.com/support/errata/RHSA-2008-0957.html http://www.securityfocus.com/bid/27219 https://oval. • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2007-5906
https://notcve.org/view.php?id=CVE-2007-5906
Xen 3.1.1 allows virtual guest system users to cause a denial of service (hypervisor crash) by using a debug register (DR7) to set certain breakpoints. El Xen 3.1.1 permite a usuarios invitados virtuales provocar una denegación de servicio (caída del hypervisor) mediante el uso de un registro de depuración (DR7) para establecer ciertos puntos de ruptura. • http://lists.opensuse.org/opensuse-security-announce/2008-01/msg00002.html http://lists.xensource.com/archives/html/xen-devel/2007-10/msg01048.html http://secunia.com/advisories/28405 http://secunia.com/advisories/28412 http://secunia.com/advisories/28636 http://www.novell.com/linux/security/advisories/suse_security_summary_report.html http://www.securityfocus.com/bid/27219 •