Xen 3.4 through 4.2, and possibly earlier versions, allows local guest OS administrators to cause a denial of service (Xen infinite loop and physical CPU consumption) by setting a VCPU with an "inappropriate deadline."
Publish Date : 2012-11-21 Last Update Date : 2017-08-29
Title |
Definition Id |
Class |
Family |
DEPRECATED: ELSA-2012-1540 -- kernel security, bug fix, and enhancement update (important) |
oval:org.mitre.oval:def:27435 |
|
unix |
DSA-2582-1 xen - denial of service |
oval:org.mitre.oval:def:20155 |
|
unix |
ELSA-2012-1540-1 -- kernel security, bug fix, and enhancement update (important) |
oval:org.mitre.oval:def:27375 |
|
unix |
ELSA-2012:1540: kernel security, bug fix, and enhancement update (Important) |
oval:org.mitre.oval:def:23068 |
|
unix |
RHSA-2012:1540: kernel security, bug fix, and enhancement update (Important) |
oval:org.mitre.oval:def:21233 |
|
unix |
RHSA-2012:1540: kernel security, bug fix, and enhancement update (Important) |
oval:com.redhat.rhsa:def:20121540 |
|
unix |
SUSE-SU-2014:0470-1 -- Security update for Xen |
oval:org.mitre.oval:def:25516 |
|
unix |
SUSE-SU-2014:0446-1 -- Security update for Xen |
oval:org.mitre.oval:def:25115 |
|
unix |
|
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify
a vulnerability or a missing patch. Check out the OVAL definitions
if you want to learn what you should do to verify a vulnerability.