{
  "details" : [ "The do_tmem_destroy_pool function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly validate pool ids, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or execute arbitrary code via unspecified vectors.  NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others." ],
  "statement" : "Not vulnerable.\nThis issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5 because we did not support TMEM (Transcendent Memory).\nThis issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.",
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2012-6035\nhttps://nvd.nist.gov/vuln/detail/CVE-2012-6035" ],
  "name" : "CVE-2012-6035",
  "csaw" : false
}