The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html - | |
References | () http://lists.xen.org/archives/html/xen-devel/2012-07/msg01649.html - Exploit, Vendor Advisory | |
References | () http://secunia.com/advisories/55082 - | |
References | () http://security.gentoo.org/glsa/glsa-201309-24.xml - | |
References | () http://www.debian.org/security/2012/dsa-2531 - | |
References | () http://www.securityfocus.com/bid/54691 - |
Information
Published : 2012-12-03 21:55
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3432
Mitre link : CVE-2012-3432
CVE.ORG link : CVE-2012-3432
JSON object : View
Products Affected
xen
- xen
CWE
CWE-264
Permissions, Privileges, and Access Controls