Xen 4.0 and 4.1 allows local HVM guest OS kernels to cause a denial of service (domain 0 VCPU hang and kernel panic) by modifying the physical address space in a way that triggers excessive shared page search time during the p2m teardown.
Weaknesses in this category are related to improper management of system resources.
Link | Tags |
---|---|
http://www.debian.org/security/2012/dsa-2531 | vendor advisory |
http://secunia.com/advisories/55082 | third party advisory |
http://www.openwall.com/lists/oss-security/2012/08/09/3 | mailing list |
http://security.gentoo.org/glsa/glsa-201309-24.xml | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00025.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2012-08/msg00024.html | vendor advisory |
http://www.securityfocus.com/bid/54942 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00018.html | vendor advisory |
http://lists.xen.org/archives/html/xen-devel/2012-08/msg00855.html | mailing list |
http://lists.opensuse.org/opensuse-security-announce/2012-09/msg00017.html | vendor advisory |