CVE-2012-5513
13.12.2012, 11:53
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.Enginsight
Vendor | Product | Version |
---|---|---|
xen | xen | 𝑥 ≤ 4.2.0 |
xen | xen | 3.0.2 |
xen | xen | 3.0.3 |
xen | xen | 3.0.4 |
xen | xen | 3.1.3 |
xen | xen | 3.1.4 |
xen | xen | 3.2.0 |
xen | xen | 3.2.1 |
xen | xen | 3.2.2 |
xen | xen | 3.2.3 |
xen | xen | 3.3.0 |
xen | xen | 3.3.1 |
xen | xen | 3.3.2 |
xen | xen | 3.4.0 |
xen | xen | 3.4.1 |
xen | xen | 3.4.2 |
xen | xen | 3.4.3 |
xen | xen | 3.4.4 |
xen | xen | 4.0.0 |
xen | xen | 4.0.1 |
xen | xen | 4.0.2 |
xen | xen | 4.0.3 |
xen | xen | 4.0.4 |
xen | xen | 4.1.0 |
xen | xen | 4.1.1 |
xen | xen | 4.1.2 |
xen | xen | 4.1.3 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
xen |
| ||||||||||||||
xen-3.1 |
| ||||||||||||||
xen-3.2 |
| ||||||||||||||
xen-3.3 |
|
Common Weakness Enumeration
References