Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5514

Опубликовано: 13 дек. 2012
Источник: debian
EPSS Низкий

Описание

The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.1.3-6package

EPSS

Процентиль: 21%
0.0007
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.

redhat
около 13 лет назад

The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.

nvd
около 13 лет назад

The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.

github
больше 3 лет назад

The guest_physmap_mark_populate_on_demand function in Xen 4.2 and earlier does not properly unlock the subject GFNs when checking if they are in use, which allows local guest HVM administrators to cause a denial of service (hang) via unspecified vectors.

suse-cvrf
почти 13 лет назад

Security update for Xen

EPSS

Процентиль: 21%
0.0007
Низкий