Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-1642

Опубликовано: 26 янв. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.4

Описание

The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.

РелизСтатусПримечание
devel

released

4.3.0-1ubuntu5
lucid

DNE

precise

released

4.1.5-0ubuntu0.12.04.3
quantal

released

4.1.5-0ubuntu0.12.10.3
raring

ignored

end of life
saucy

released

4.3.0-1ubuntu1.3
upstream

needed

Показывать по

РелизСтатусПримечание
devel

DNE

lucid

not-affected

precise

DNE

quantal

DNE

raring

DNE

saucy

DNE

upstream

ignored

end of life

Показывать по

EPSS

Процентиль: 39%
0.00178
Низкий

4.4 Medium

CVSS2

Связанные уязвимости

redhat
около 12 лет назад

The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.

nvd
около 12 лет назад

The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.

debian
около 12 лет назад

The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough an ...

github
больше 3 лет назад

The IRQ setup in Xen 4.2.x and 4.3.x, when using device passthrough and configured to support a large number of CPUs, frees certain memory that may still be intended for use, which allows local guest administrators to cause a denial of service (memory corruption and hypervisor crash) and possibly execute arbitrary code via vectors related to an out-of-memory error that triggers a (1) use-after-free or (2) double free.

EPSS

Процентиль: 39%
0.00178
Низкий

4.4 Medium

CVSS2