CVE-2012-5515

Priority
Description
The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3)
XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest
administrators to cause a denial of service (long loop and hang) via a
crafted extent_order value.
Assigned-to
smb
Notes
jdstrandxen 3.3 probably not affected
Package
Source: xen (LP Ubuntu Debian)
Upstream:needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
Package
Upstream:needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
Package
Upstream:needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
Package
Upstream:needs-triage
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2020-01-29 19:45:20 UTC (commit 768ceb2fdee6790d707d0f681e1b54916744af1e)