Submitted by Vincent (CVE) Danen on Fri, 09/18/2015 - 04:18
The XENMEM_exchange handler in Xen 4.2 and earlier does not properly check the memory address, which allows local PV guest OS administrators to cause a denial of service (crash) or possibly gain privileges via unspecified vectors that overwrite memory in the hypervisor reserved range.
This issue did affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.
This issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.
CVE-2012-5513 kernel: xen: XENMEM_exchange may overwrite hypervisor memory
Red Hat would like to thank the Xen project for reporting this issue.
Red Hat Security Errata
|Red Hat Enterprise Linux 5 (kernel)||RHSA-2012:1540||2012-12-04|
Affected Packages State
|Red Hat Enterprise Linux 5||kernel-xen||Affected|