First published: Fri Nov 23 2012(Updated: )
XENMEM_populate_physmap in Xen 4.0, 4.1, and 4.2, and Citrix XenServer 6.0.2 and earlier, when translating paging mode is not used, allows local PV OS guest kernels to cause a denial of service (BUG triggered and host crash) via invalid flags such as MEMF_populate_on_demand.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
XenServer | <=6.0.2 | |
Xen xen-unstable | =4.0.0 | |
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3496 is considered to be of high severity due to its potential to cause a denial of service attack leading to host crashes.
To fix CVE-2012-3496, upgrade to Xen version 4.3 or later, or Citrix XenServer 6.1 or later.
CVE-2012-3496 affects Xen versions 4.0, 4.1, 4.2, and Citrix XenServer 6.0.2 and earlier.
CVE-2012-3496 allows local PV OS guest kernels to cause a denial of service by triggering a bug through invalid flags.
There is no widely recommended workaround for CVE-2012-3496, and upgrading to a fixed version is the best option.