CVE-2012-5515XEN vulnerability

7 documents6 sources
Severity
4.7MEDIUMNVD
EPSS
0.1%
top 65.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 13
Latest updateMay 17

Description

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

CVSS vector

AV:L/AC:M/C:N/I:N/A:CExploitability: 3.4 | Impact: 6.9

Affected Packages3 packages

debiandebian/xen< xen 4.1.3-5 (bookworm)
Debianxen/xen< 4.1.3-5+3
NVDxen/xen4.2.0+26

🔴Vulnerability Details

2
GHSA
GHSA-h2f3-x3v9-p3c5: The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 42022-05-17
OSV
CVE-2012-5515: The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 42012-12-13

📋Vendor Advisories

2
Red Hat
kernel: xen: Several memory hypercall operations allow invalid extent order values2012-12-03
Debian
CVE-2012-5515: xen - The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM...2012

💬Community

2
Bugzilla
CVE-2012-5515 kernel: xen: Several memory hypercall operations allow invalid extent order values [fedora-all]2012-12-03
Bugzilla
CVE-2012-5515 kernel: xen: Several memory hypercall operations allow invalid extent order values2012-11-16