Input validation error in Xen - CVE-2012-5510
Published: December 13, 2012 / Updated: August 4, 2020
Xen
Xen Project
Description
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors.
Remediation
External links
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html
- http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html
- http://secunia.com/advisories/51397
- http://secunia.com/advisories/51468
- http://secunia.com/advisories/51486
- http://secunia.com/advisories/51487
- http://secunia.com/advisories/55082
- http://security.gentoo.org/glsa/glsa-201309-24.xml
- http://support.citrix.com/article/CTX135777
- http://www.debian.org/security/2012/dsa-2582
- http://www.openwall.com/lists/oss-security/2012/12/03/6
- http://www.osvdb.org/88128
- http://www.securityfocus.com/bid/56794
- https://exchange.xforce.ibmcloud.com/vulnerabilities/80478