The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xen | Xen | 4.0.0 (including) | 4.0.0 (including) |
Xen | Xen | 4.1.0 (including) | 4.1.0 (including) |
Xen | Xen | 4.2.0 (including) | 4.2.0 (including) |
Xen | Ubuntu | devel | * |
Xen | Ubuntu | oneiric | * |
Xen | Ubuntu | precise | * |
Xen | Ubuntu | quantal | * |
Xen-3.3 | Ubuntu | natty | * |