CVE-2012-4539
https://notcve.org/view.php?id=CVE-2012-4539
Xen 4.0 through 4.2, when running 32-bit x86 PV guests on 64-bit hypervisors, allows local guest OS administrators to cause a denial of service (infinite loop and hang or crash) via invalid arguments to GNTTABOP_get_status_frames, aka "Grant table hypercall infinite loop DoS vulnerability." Xen 4.0 hasta 4.2, al ejecutar clientes 32-bit x86 PV en hipervisores 64-bit, permite a los administradores locales del sistema operativo cliente causar una denegación de servicio (bucle infinito y cuelgue o caída) a través de argumentos no válidos a GNTTABOP_get_status_frames, alias "Grant table hypercall infinite loop DoS vulnerability". • http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00008.html http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00009.html http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2014-03 • CWE-399: Resource Management Errors •
CVE-2012-3432
https://notcve.org/view.php?id=CVE-2012-3432
The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions. La función handle_mmio en arch/x86/hvm/io.c en el emulador de operaciones MMIO para Xen v3.3 y v4.x, cuando se ejecuta un HVM huesped, no reinicia correctamente la información de estado entre determinados ciclos de emulación, lo que permite a los usuarios del sistema operativo huésped provocar una denegación de servicio (caída de OS huesped) a través de operaciones no especificadas en las regiones MMIO. • http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html http://lists.xen.org/archives/html/xen-devel/2012-07/msg01649.html http://secunia.com/advisories/55082 http://security.gentoo.org/glsa/glsa-201309-24.xml http://www.debian.org/security/2012/ds • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2012-3433
https://notcve.org/view.php?id=CVE-2012-3433
Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown. Xen v4.0 y v4.1 permite a los kernels OS locales HVM de invitado causar una denegación de servicio (cuelgue de dominio 0 VCPU y "kernel panic") mediante la modificación del espacio de direcciones físicas de una forma que provoca exceso de tiempo de búsqueda de página compartida durante el "p2m teardown". • http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html http://lists.xen.org/archives/html/xen-devel/2012-08/msg00855.html http://secunia.com/advisories/55082 http://security.gentoo.org/glsa/glsa-201309-24.xml http://www.debian.org/security/2012/ds • CWE-399: Resource Management Errors •
CVE-2012-2625 – xen: pv bootloader doesn't check the size of the bzip2 or lzma compressed kernel
https://notcve.org/view.php?id=CVE-2012-2625
The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image. El gestor de arranque Pygrub en Xen inestable ante del changeset 25589:60f09d1ab1fe, v4.2.x, v4.1.x permite causar una denegación de servicio (consumo de memoria) a usuarios locales para-virtualizados a través de una imagen del kernel comprimida en (1) o bzip2 (2) lzma demasiado grande. • http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1817 http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html& • CWE-20: Improper Input Validation •
CVE-2012-0218
https://notcve.org/view.php?id=CVE-2012-0218
Xen 3.4, 4.0, and 4.1, when the guest OS has not registered a handler for a syscall or sysenter instruction, does not properly clear a flag for exception injection when injecting a General Protection Fault, which allows local PV guest OS users to cause a denial of service (guest crash) by later triggering an exception that would normally be handled within Xen. Xen v3.4, v4.0 y v4.1, cuando en el sistema operativo huésped no se ha registrado un controlador para una instrucción syscall o sysenter, no limpia correctamente una bandera para la inyección de excepciones cuando se inyecta un error de protección general (General Protection Fault), lo que permite causar una denegación de servicio (caída del SO invitado) a los usuarios de los sistemas operativos de los PV huéspedes mediante la activación de una excepción que normalmente sería manejado dentro de Xen. • http://lists.xen.org/archives/html/xen-announce/2012-06/msg00003.html http://secunia.com/advisories/55082 http://security.gentoo.org/glsa/glsa-201309-24.xml http://www.debian.org/security/2012/dsa-2501 •