Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2013-1920

Опубликовано: 12 апр. 2013
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4

Описание

Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.

РелизСтатусПримечание
devel

not-affected

no XSM_ENABLE in Config.mk
hardy

DNE

lucid

DNE

oneiric

not-affected

no XSM_ENABLE in Config.mk
precise

not-affected

no XSM_ENABLE in Config.mk
quantal

not-affected

no XSM_ENABLE in Config.mk
upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

not-affected

no XSM_ENABLE

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

ignored

end of life
lucid

DNE

oneiric

DNE

precise

DNE

quantal

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

hardy

DNE

lucid

not-affected

no XSM_ENABLE in Config.mk
oneiric

DNE

precise

DNE

quantal

DNE

upstream

needed

Показывать по

EPSS

Процентиль: 20%
0.00064
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

redhat
почти 13 лет назад

Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.

nvd
почти 13 лет назад

Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.

debian
почти 13 лет назад

Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under m ...

github
больше 3 лет назад

Xen 4.2.x, 4.1.x, and earlier, when the hypervisor is running "under memory pressure" and the Xen Security Module (XSM) is enabled, uses the wrong ordering of operations when extending the per-domain event channel tracking table, which causes a use-after-free and allows local guest kernels to inject arbitrary events and gain privileges via unspecified vectors.

EPSS

Процентиль: 20%
0.00064
Низкий

4.4 Medium

CVSS2