First published: Wed Oct 31 2012(Updated: )
The PV domain builder in Xen 4.2 and earlier does not validate the size of the kernel or ramdisk (1) before or (2) after decompression, which allows local guest administrators to cause a denial of service (domain 0 memory consumption) via a crafted (a) kernel or (b) ramdisk.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.2.0 | |
Xen xen-unstable | =4.1.0 | |
Xen xen-unstable | =4.1.1 | |
Xen xen-unstable | =4.1.2 | |
Xen xen-unstable | =4.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4544 is classified as a denial of service vulnerability due to excessive memory consumption in domain 0.
To fix CVE-2012-4544, upgrade to Xen version 4.2.1 or later, which contains the necessary patches.
CVE-2012-4544 affects Xen 4.2 and earlier versions, specifically 4.1.x versions including 4.1.0 to 4.1.3.
CVE-2012-4544 allows local guest administrators to perform denial of service attacks through crafted kernels or ramdisks.
Yes, CVE-2012-4544 can significantly impact your Xen environment by causing domain 0 to consume excessive memory.