CVE-2012-5634
https://notcve.org/view.php?id=CVE-2012-5634
Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt. Xen v4.2.x, v4.1.x, y v4.0, cuando usa Intel VT-d para el paso por el PCI, no configura apropiadamente VT-d cuando soporta un dispositivo que esta detrás de un puente PCI heredado, lo que permite a invitados locales causar una denegación de servicio a otros invitados por medio de la inyección de una interrupción. • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html http://secunia.com/advisories/55082 http://security.gentoo.org/glsa/glsa-201309-24.xml http://www.debian.org/security/2013/dsa-2636 http://www.openwall.com/lists/oss-security/2013/01/09/5 • CWE-16: Configuration •
CVE-2013-0153 – kernel: xen: interrupt remap entries shared and old ones not cleared on AMD IOMMUs
https://notcve.org/view.php?id=CVE-2013-0153
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests. El soporte de Xen para AMD IOMMU en v4.2.x, v4.1.x, v3.3, and otras versiones, cuando usa AMD-Vi para el paso por el PCI, usa la misma tabla para el trazado de interrupciones por el host y los anfitriones, lo que permite a los invitados causar una denegación de servicio por medio de la inyección de una interrupción en los otros invitados. • http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html http://lists.opensuse.org/opensuse-updates/2013-06/msg00049.html http://osvdb.org/89867 http://rhn.redhat.com/errata/RHSA-2013-0847.html http://secunia.com/advisories/51881 http://secunia.com/advisories/55082 http://security.gentoo.org/glsa/glsa-201309-24.xml http://www.deb •
CVE-2012-6333
https://notcve.org/view.php?id=CVE-2012-6333
Multiple HVM control operations in Xen 3.4 through 4.2 allow local HVM guest OS administrators to cause a denial of service (physical CPU consumption) via a large input. Varias operaciones de control de HVM en Xen v3.4 hasta la v4.2 permiten a administradores de sistemas operativos invitados locales causar una denegación de servicio (excesivo consumo de CPU física) a través de una entrada de datos demasiado grande. • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html http://secunia.com/advisories/51397 http://secunia.com/advisories/51486 http://secunia.com/advisories/51487 http://secunia.com/advisories/55082 http://security.gentoo.org/glsa/glsa-201309-24.xml http://support.citrix.com/article/CTX135777 http://www.openwall.com/lists/oss-security/2012/12/03/10 http://www.osvdb.org/88129 http:& • CWE-399: Resource Management Errors •
CVE-2012-5511
https://notcve.org/view.php?id=CVE-2012-5511
Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image. Desbordamiento de búfer en la funcionalidad "dirty video RAM tracking" en Xen 3.4 a la 4.1, permite a los huespedes HVM administradores del sistema operativo local provocar una denegación de servicio (caída) a través de una imagen bitmap demasiado grande. • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html http • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2012-5514
https://notcve.org/view.php?id=CVE-2012-5514
The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors. La función guest_physmap_mark_populate_on_demand en Xen v4.2 y anteriores no desbloquea correctamente los GFNs al comprobar si están en uso, lo que permite causar una denegación de servicio (caída del HVM)a los administradores de HVM invitados locales a través de vectores no especificados. • http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html http •