
CVE-2019-17347 – Debian Security Advisory 4602-1
https://notcve.org/view.php?id=CVE-2019-17347
08 Oct 2019 — An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels). Se detectó un problema en Xen versiones hasta 4.11.x, permitiendo a usuarios del sistema operativo invitado PV de x86, causar una denegación de servicio u alcanzar privilegios porque un invitado puede manipular su %cr4 virtualizado en una manera que es incom... • http://www.openwall.com/lists/oss-security/2019/10/25/8 • CWE-20: Improper Input Validation •

CVE-2019-17348 – Debian Security Advisory 4602-1
https://notcve.org/view.php?id=CVE-2019-17348
08 Oct 2019 — An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service because of an incompatibility between Process Context Identifiers (PCID) and shadow-pagetable switching. Se detectó un problema en Xen versiones hasta 4.11.x, permitiendo a usuarios del sistema operativo invitado PV de x86, causar una denegación de servicio debido a una incompatibilidad entre los Identificadores de Contexto del Proceso (PCID) y la conmutación shadow-pagetable. Multiple vulnerabilities h... • http://www.openwall.com/lists/oss-security/2019/10/25/7 • CWE-20: Improper Input Validation •

CVE-2019-17349 – Debian Security Advisory 4602-1
https://notcve.org/view.php?id=CVE-2019-17349
08 Oct 2019 — An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a LoadExcl or StoreExcl operation. Se detectó un problema en Xen versiones hasta 4.12.x, permitiendo a atacantes Arm domU causar una denegación de servicio (bucle infinito) involucrando una operación LoadExcl o StoreExcl. Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, guest-to-host privilege escalation or information l... • http://xenbits.xen.org/xsa/advisory-295.html • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2019-17350 – Debian Security Advisory 4602-1
https://notcve.org/view.php?id=CVE-2019-17350
08 Oct 2019 — An issue was discovered in Xen through 4.12.x allowing Arm domU attackers to cause a denial of service (infinite loop) involving a compare-and-exchange operation. Se detectó un problema en Xen versiones hasta 4.12.x, permitiendo a atacantes Arm domU causar una denegación de servicio (bucle infinito) involucrando una operación de comparar e intercambiar. Multiple vulnerabilities have been discovered in the Xen hypervisor, which could result in denial of service, guest-to-host privilege escalation or informat... • http://xenbits.xen.org/xsa/advisory-295.html • CWE-835: Loop with Unreachable Exit Condition ('Infinite Loop') •

CVE-2019-17351 – Ubuntu Security Notice USN-4286-1
https://notcve.org/view.php?id=CVE-2019-17351
08 Oct 2019 — An issue was discovered in drivers/xen/balloon.c in the Linux kernel before 5.2.3, as used in Xen through 4.12.x, allowing guest OS users to cause a denial of service because of unrestricted resource consumption during the mapping of guest memory, aka CID-6ef36ab967c7. Se detectó un problema en el archivo drivers/xen/balloon.c en el kernel de Linux versiones anteriores a 5.2.3, como es usado en Xen versiones hasta 4.12.x, permitiendo a usuarios del sistema operativo invitado causar una denegación de servici... • http://www.openwall.com/lists/oss-security/2019/10/25/9 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVE-2018-19965 – Debian Security Advisory 4369-1
https://notcve.org/view.php?id=CVE-2018-19965
08 Dec 2018 — An issue was discovered in Xen through 4.11.x allowing 64-bit PV guest OS users to cause a denial of service (host OS crash) because #GP[0] can occur after a non-canonical address is passed to the TLB flushing code. NOTE: this issue exists because of an incorrect CVE-2017-5754 (aka Meltdown) mitigation. Se ha descubierto un problema en Xen 4.11.x que permite que usuarios PV invitados del sistema operativo de 64 bits provoquen una denegación de servicio (cierre inesperado del sistema operativo del host) debi... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html •

CVE-2018-19967 – Debian Security Advisory 4369-1
https://notcve.org/view.php?id=CVE-2018-19967
08 Dec 2018 — An issue was discovered in Xen through 4.11.x on Intel x86 platforms allowing guest OS users to cause a denial of service (host OS hang) because Xen does not work around Intel's mishandling of certain HLE transactions associated with the KACQUIRE instruction prefix. Se ha descubierto un problema en Xen hasta las versiones 4.11.x en plataformas Intel x86 que permite que los usuarios del sistema operativo invitados provoquen una denegación de servicio (bloqueo del sistema operativo del host) debido a que Xen ... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00057.html • CWE-20: Improper Input Validation •

CVE-2018-19961 – Debian Security Advisory 4369-1
https://notcve.org/view.php?id=CVE-2018-19961
08 Dec 2018 — An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes. Se ha descubierto un problema en Xen hasta las versiones 4.11.x en plataformas AMD x86, que podría permitir que usuarios invitados del sistema operativo obtengan privilegios del host del sistema operativo. Esto se debe a que los vaciados TLB no siempre ocurren tras cambios en el mapeo de IOMMU. Multiple vulnerabil... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html • CWE-459: Incomplete Cleanup •

CVE-2018-19962 – Debian Security Advisory 4369-1
https://notcve.org/view.php?id=CVE-2018-19962
08 Dec 2018 — An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones. Se ha descubierto un problema en Xen hasta las versiones 4.11.x en plataformas AMD x86, que podría permitir que usuarios invitados del sistema operativo obtengan privilegios del host del sistema operativo. Esto se debe a que los mapeos de IOMMU pequeños se combinan de forma insegura con mapeos más grandes. Multipl... • http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00072.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2018-15470 – Gentoo Linux Security Advisory 201810-06
https://notcve.org/view.php?id=CVE-2018-15470
17 Aug 2018 — An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. • http://xenbits.xen.org/xsa/advisory-272.html • CWE-400: Uncontrolled Resource Consumption •