Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6031

Опубликовано: 23 нояб. 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.7

Описание

The do_tmem_get function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (CPU hang and host crash) via unspecified vectors related to a spinlock being held in the "bad_copy error path." NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

РелизСтатусПримечание
devel

ignored

hardy

DNE

lucid

DNE

natty

DNE

oneiric

ignored

precise

ignored

quantal

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

natty

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 19%
0.00059
Низкий

4.7 Medium

CVSS2

Связанные уязвимости

nvd
около 13 лет назад

The do_tmem_get function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (CPU hang and host crash) via unspecified vectors related to a spinlock being held in the "bad_copy error path." NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

debian
около 13 лет назад

The do_tmem_get function in the Transcendent Memory (TMEM) in Xen 4.0, ...

github
больше 3 лет назад

The do_tmem_get function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (CPU hang and host crash) via unspecified vectors related to a spinlock being held in the "bad_copy error path." NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

EPSS

Процентиль: 19%
0.00059
Низкий

4.7 Medium

CVSS2