CVE Reference: CVE-2012-3496

NOTE: The text on this page is written by CVE MITRE and reflects neither the opinions of Secunia or the results of our research. All data on this page is written and maintained by CVE MITRE.

Original Page at CVE MITRE:
CVE-2012-3496

Description:
XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.

CVE Status:
Candidate

References:

XF
  http://xforce.iss.net/xforce/xfdb/78267

SUSE
  http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html
  http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00012.html
  http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00004.html
  http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00003.html
  http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html
  http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html
  http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html

ST
  1027481

SAID
  Secunia Advisory: SA50472
  Secunia Advisory: SA50530
  Secunia Advisory: SA51413
  Secunia Advisory: SA55082

OSVDB
  85200

MLIST
  http://www.openwall.com/lists/oss-security/2012/09/05/7
  http://lists.xen.org/archives/html/xen-announce/2012-09/msg00002.html

MISC

GENTOO
  http://security.gentoo.org/glsa/glsa-201309-24.xml

DEBIAN
  http://www.debian.org/security/2012/dsa-2544

CONFIRM
  http://wiki.xen.org/wiki/Security_Announcements#XSA-14_XENMEM_populate_physmap_DoS_vulnerability
  http://support.citrix.com/article/CTX134708

BID
  55412


Return to the previous page.