[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248149

 
 

909

 
 

194803

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-2544-1 xen -- denial of service

ID: oval:org.secpod.oval:def:600884Date: (C)2012-09-13   (M)2022-10-10
Class: PATCHFamily: unix




Multiple denial of service vulnerabilities have been discovered in xen, an hypervisor. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2012-3494: It was discovered that set_debugreg allows writes to reserved bits of the DR7 debug control register on amd64 paravirtualised guests, allowing a guest to crash the host. CVE-2012-3496: Matthew Daley discovered that XENMEM_populate_physmap, when called with the MEMF_populate_on_demand flag set, a BUG can be triggered if a translating paging mode is not being used, allowing a guest to crash the host.

Platform:
Debian 6.0
Product:
xen
Reference:
DSA-2544-1
CVE-2012-3494
CVE-2012-3496
CVE    2
CVE-2012-3496
CVE-2012-3494
CPE    2
cpe:/o:debian:debian_linux:6.0
cpe:/a:xen:xen

© SecPod Technologies