CVE-2012-5513
Publication date 13 December 2012
Last updated 24 July 2024
Ubuntu priority
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
Status
Package | Ubuntu Release | Status |
---|---|---|
xen | 13.10 saucy |
Fixed 4.2.0-1ubuntu4
|
13.04 raring |
Fixed 4.2.0-1ubuntu4
|
|
12.10 quantal |
Fixed 4.1.3-3ubuntu1.1
|
|
12.04 LTS precise |
Fixed 4.1.2-2ubuntu2.3
|
|
11.10 oneiric |
Fixed 4.1.1-2ubuntu4.3
|
|
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Not in release | |
xen-3.1 | 13.10 saucy | Not in release |
13.04 raring | Not in release | |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Ignored end of life | |
xen-3.2 | 13.10 saucy | Not in release |
13.04 raring | Not in release | |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
10.04 LTS lucid | Not in release | |
8.04 LTS hardy | Ignored end of life | |
xen-3.3 | 13.10 saucy | Not in release |
13.04 raring | Not in release | |
12.10 quantal | Not in release | |
12.04 LTS precise | Not in release | |
11.10 oneiric | Not in release | |
10.04 LTS lucid | Ignored end of life | |
8.04 LTS hardy | Not in release |