Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2012-6033

Опубликовано: 23 нояб. 2012
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.4

Описание

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

РелизСтатусПримечание
devel

ignored

hardy

DNE

lucid

DNE

natty

DNE

oneiric

ignored

precise

ignored

quantal

ignored

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

not-affected

lucid

DNE

natty

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

natty

ignored

end of life
oneiric

DNE

precise

DNE

quantal

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 22%
0.0007
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

nvd
около 13 лет назад

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

debian
около 13 лет назад

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen ...

github
больше 3 лет назад

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.

EPSS

Процентиль: 22%
0.0007
Низкий

4.4 Medium

CVSS2