The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
Advisories
Source ID Title
EUVD EUVD EUVD-2012-5907 The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T21:21:28.366Z

Reserved: 2012-11-23T00:00:00

Link: CVE-2012-6033

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2012-11-23T20:55:04.307

Modified: 2025-04-11T00:51:21.963

Link: CVE-2012-6033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.