Release date: 2012-4 4
Updated on: 2012-12-06
Affected Systems:
XenSource Xen 4.x
XenSource Xen 3.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 56805
CVE (CAN) ID: CVE-2012-5525
Xen is an open-source Virtual Machine monitor developed by the University of Cambridge.
When Xen processes the input GFN, The get_page_from_gfn () function has an error. Memory outside the index frame table can be used. Attackers with access to the client operating system can exploit this vulnerability to crash the host operating system.
<* Source: vendor
Link: http://secunia.com/advisories/51397/
Http://lists.xen.org/archives/html/xen-announce/2012-12/msg00001.html
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
XenSource
---------
The vendor has released a patch to fix this security problem. Please download the patch from the vendor's homepage.
Xsa31-4.1.patch Xen 4.1.x
Xsa31-4.2-unstable.patch Xen 4.2.x, xen-unstable
Http://xen.xensource.com/