The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T21:21:28.366Z
Reserved: 2012-11-23T00:00:00
Link: CVE-2012-6033

No data.

Status : Modified
Published: 2012-11-23T20:55:04.307
Modified: 2024-11-21T01:45:39.673
Link: CVE-2012-6033

No data.