The handle_mmio function in arch/x86/hvm/io.c in the MMIO operations emulator for Xen 3.3 and 4.x, when running an HVM guest, does not properly reset certain state information between emulation cycles, which allows local guest OS users to cause a denial of service (guest OS crash) via unspecified operations on MMIO regions.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://www.debian.org/security/2012/dsa-2531 | vendor advisory |
http://secunia.com/advisories/55082 | third party advisory |
http://lists.xen.org/archives/html/xen-devel/2012-07/msg01649.html | mailing list exploit vendor advisory |
http://security.gentoo.org/glsa/glsa-201309-24.xml | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html | vendor advisory |
http://www.securityfocus.com/bid/54691 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html | vendor advisory |