CVE-2012-2625

The PyGrub boot loader in Xen unstable before changeset 25589:60f09d1ab1fe, 4.2.x, and 4.1.x allows local para-virtualized guest users to cause a denial of service (memory consumption) via a large (1) bzip2 or (2) lzma compressed kernel image.
References
Link Resource
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1817 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1130.html Third Party Advisory
http://secunia.com/advisories/49184 Third Party Advisory
http://secunia.com/advisories/51413 Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/10/26/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/53650 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1027090 Third Party Advisory VDB Entry
http://xenbits.xensource.com/hg/xen-unstable.hg/rev/60f09d1ab1fe Vendor Advisory
http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1817 Broken Link
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2012-1130.html Third Party Advisory
http://secunia.com/advisories/49184 Third Party Advisory
http://secunia.com/advisories/51413 Third Party Advisory
http://www.openwall.com/lists/oss-security/2012/10/26/3 Mailing List Third Party Advisory
http://www.securityfocus.com/bid/53650 Third Party Advisory VDB Entry
http://www.securitytracker.com/id?1027090 Third Party Advisory VDB Entry
http://xenbits.xensource.com/hg/xen-unstable.hg/rev/60f09d1ab1fe Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.1.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:4.2.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen-unstable:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:39

Type Values Removed Values Added
References () http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1817 - Broken Link () http://bugzilla.xensource.com/bugzilla/show_bug.cgi?id=1817 - Broken Link
References () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00005.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00017.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2012-11/msg00018.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2012-1130.html - Third Party Advisory () http://rhn.redhat.com/errata/RHSA-2012-1130.html - Third Party Advisory
References () http://secunia.com/advisories/49184 - Third Party Advisory () http://secunia.com/advisories/49184 - Third Party Advisory
References () http://secunia.com/advisories/51413 - Third Party Advisory () http://secunia.com/advisories/51413 - Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2012/10/26/3 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2012/10/26/3 - Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/53650 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/53650 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1027090 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1027090 - Third Party Advisory, VDB Entry
References () http://xenbits.xensource.com/hg/xen-unstable.hg/rev/60f09d1ab1fe - Vendor Advisory () http://xenbits.xensource.com/hg/xen-unstable.hg/rev/60f09d1ab1fe - Vendor Advisory

Information

Published : 2012-10-31 16:55

Updated : 2024-11-21 01:39


NVD link : CVE-2012-2625

Mitre link : CVE-2012-2625

CVE.ORG link : CVE-2012-2625


JSON object : View

Products Affected

xen

  • xen
  • xen-unstable
CWE
CWE-20

Improper Input Validation