CVE-2012-6033
Published: 23 November 2012
The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
Notes
Author | Note |
---|---|
seth-arnold | Xen team strongly recommends against TMEM use |
mdeslaur | only 4.0 and higher ONLY installations where "tmem" is specified on the hypervisor command line are vulnerable. Most Xen installations do not do so. upstream says: "TMEM has been described by its maintainers as a technology preview, and is therefore not supported by them for use in production systems. Pending a full security audit of the code, the Xen.org security team recommends that Xen users do not enable TMEM." We will not be fixing this in Ubuntu. Marking as "ignored" |
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Ignored
|
|
precise |
Ignored
|
|
quantal |
Ignored
|
|
upstream |
Needs triage
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.1 Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
upstream |
Needs triage
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.2 Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
|
lucid |
Does not exist
|
|
natty |
Does not exist
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
upstream |
Needs triage
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
hardy |
Does not exist
|
lucid |
Not vulnerable
|
|
natty |
Ignored
(end of life)
|
|
oneiric |
Does not exist
|
|
precise |
Does not exist
|
|
quantal |
Does not exist
|
|
upstream |
Needs triage
|
|
Binaries built from this source package are in Universe and so are supported by the community. |
References
- http://xforce.iss.net/xforce/xfdb/78268
- http://www.securitytracker.com/id?1027482
- http://www.openwall.com/lists/oss-security/2012/09/05/8
- http://wiki.xen.org/wiki/Security_Announcements#XSA-15_multiple_TMEM_hypercall_vulnerabilities
- http://secunia.com/advisories/50472
- http://osvdb.org/85199
- http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.html
- https://www.cve.org/CVERecord?id=CVE-2012-6033
- NVD
- Launchpad
- Debian