CVE-2012-6333
Published: 13 December 2012
Multiple HVM control operations in Xen 3.4 through 4.2 allow local HVM guest OS administrators to cause a denial of service (physical CPU consumption) via a large input.
Priority
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Released
(4.2)
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Released
(4.2.0-1ubuntu4)
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.1 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.2 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. | ||
xen-3.3 Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. |
Notes
Author | Note |
---|---|
mdeslaur | hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary This is CVE assigned to one of the issues previously bundled in CVE-2012-5511. The fix is included in the CVE-2012-5511 patch. (XSA-27) |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6333
- http://xforce.iss.net/xforce/xfdb/80484
- http://www.openwall.com/lists/oss-security/2012/12/03/10
- http://support.citrix.com/article/CTX135777
- http://secunia.com/advisories/51487
- http://secunia.com/advisories/51486
- http://secunia.com/advisories/51397
- http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html
- NVD
- Launchpad
- Debian