CVE-2015-7969
https://notcve.org/view.php?id=CVE-2015-7969
Multiple memory leaks in Xen 4.0 through 4.6.x allow local guest administrators or domains with certain permission to cause a denial of service (memory consumption) via a large number of "teardowns" of domains with the vcpu pointer array allocated using the (1) XEN_DOMCTL_max_vcpus hypercall or the xenoprofile state vcpu pointer array allocated using the (2) XENOPROF_get_buffer or (3) XENOPROF_set_passive hypercall. Fugas de memoria múltiples en Xen 4.0 hasta la versión 4.6.x permite a administradores locales invitados o dominios con cierto permiso provocar una denegación de servicio (consumo de memoria) a través de un gran número de 'desensamblajes' de dominios con el array de punteros vcpu asignados utilizando (1) la hypercall XEN_DOMCTL_max_vcpus o el array de punteros vcpu asignados en el estado xenoprofile utilizando la hypercall (2) XENOPROF_get_buffer o (3) XENOPROF_set_passive . • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html http://support.citrix.com/article/CTX202404 http://www.debian.org/security/2015/dsa-3414 http://www.securityfocus.com/bid/77364 http://www.securitytracker.com/id/1034033 http://xenbits. • CWE-399: Resource Management Errors •
CVE-2015-7835
https://notcve.org/view.php?id=CVE-2015-7835
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping. La función mod_l2_entry en arch/x86/mm.c en Xen 3.4 hasta la versión 4.6.x no valida correctamente las entradas de la tabla de paginación de nivel 2, lo que permite a administradores invitados PV locales obtener privilegios a través de un mapeo de superpage manipulado. • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html http://support.citrix.com/article/CTX202404 http://www.debian.org/security/2015/dsa-3390 http://www.securityfocus.com/bid/773 • CWE-20: Improper Input Validation CWE-264: Permissions, Privileges, and Access Controls •
CVE-2015-7970
https://notcve.org/view.php?id=CVE-2015-7970
The p2m_pod_emergency_sweep function in arch/x86/mm/p2m-pod.c in Xen 3.4.x, 3.5.x, and 3.6.x is not preemptible, which allows local x86 HVM guest administrators to cause a denial of service (CPU consumption and possibly reboot) via crafted memory contents that triggers a "time-consuming linear scan," related to Populate-on-Demand. La función p2m_pod_emergency_sweep en arch/x86/mm/p2m-pod.c en Xen 3.4.x, 3.5,x y 3.6.x no es preferente, lo que permite a administradores invitados x86 HVM locales provocar una denegación de servicio (consumo de CPU y posiblemente reinicio) a través de contenidos de memoria manipulados que desencadena un 'time-consuming linear scan', relacionado con Populate-on-Demand. • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html http://lists.opensuse.org/opensuse-updates/2015-12/msg00053.html http://support.citrix.com/article/CTX202404 http://www.debian.org/security/2015/dsa-3414 http://www.securityfocus.com/bid/77362 http://www.securitytracker.com/id/1034034 http://xenbits. • CWE-399: Resource Management Errors •
CVE-2015-7972
https://notcve.org/view.php?id=CVE-2015-7972
The (1) libxl_set_memory_target function in tools/libxl/libxl.c and (2) libxl__build_post function in tools/libxl/libxl_dom.c in Xen 3.4.x through 4.6.x do not properly calculate the balloon size when using the populate-on-demand (PoD) system, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors related to "heavy memory pressure." La función (1) libxl_set_memory_target en tools/libxl/libxl.c y (2) libxl__build_post en tools/libxl/libxl_dom.c en Xen 3.4.x hasta la versión 4.6.x no calcula correctamente el tamaño del globo cuando utilizan el sistema populate-on-demand (PoD), lo que permite a usuarios invitados HVM locales provocar una denegación de servicio (caída de invitados) a través de vectores no especificados relacionados con 'heavy memory pressure.' • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html http://lists.opensuse.org/opensuse-updates/2015-11/msg00063.html http://support.citrix.com/article/CTX202404 http://www.debian.org/security/2015/dsa-3414 http://www.securityfocus.com/bid/77365 http://www.securitytracker.com/id/1034036 http://xenbits. • CWE-399: Resource Management Errors •
CVE-2015-7813
https://notcve.org/view.php?id=CVE-2015-7813
Xen 4.4.x, 4.5.x, and 4.6.x does not limit the number of printk console messages when reporting unimplemented hypercalls, which allows local guests to cause a denial of service via a sequence of (1) HYPERVISOR_physdev_op hypercalls, which are not properly handled in the do_physdev_op function in arch/arm/physdev.c, or (2) HYPERVISOR_hvm_op hypercalls, which are not properly handled in the do_hvm_op function in arch/arm/hvm.c. Xen 4.4.x, 4.5.x y 4.6.x no limita el número de mensajes de la consola printk cuando reporta hypercalls no implementadas, lo que permite a invitados locales provocar una denegación de servicio a través de una secuencia de (1) hypercalls HYPERVISOR_physdev_op, las cuales no son manejadas adecuadamente en la función do_physdev_op en arch/arm/physdev.c o (2) hypercalls HYPERVISOR_hvm_op, las cuales no son manejadas adecuadamente en la función do_hvm_op en arch/arm/hvm.c. • http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171082.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171185.html http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171249.html http://www.debian.org/security/2015/dsa-3414 http://www.securitytracker.com/id/1034029 http://xenbits.xen.org/xsa/advisory-146.html https://security.gentoo.org/glsa/201604-03 • CWE-399: Resource Management Errors •