Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-3124

Опубликовано: 07 мая 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.7

Описание

The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page table translations for unspecified memory page types.

РелизСтатусПримечание
devel

released

4.4.0-0ubuntu6
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.0-0ubuntu5.1]]
lucid

DNE

precise

released

4.1.6.1-0ubuntu0.12.04.2
quantal

ignored

end of life
saucy

released

4.3.0-1ubuntu1.4
trusty

released

4.4.0-0ubuntu5.1
trusty/esm

DNE

trusty was released [4.4.0-0ubuntu5.1]
upstream

needs-triage

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

precise

DNE

quantal

DNE

saucy

DNE

trusty

DNE

trusty/esm

DNE

upstream

ignored

end of life

Показывать по

EPSS

Процентиль: 67%
0.00527
Низкий

6.7 Medium

CVSS2

Связанные уязвимости

redhat
почти 12 лет назад

The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page table translations for unspecified memory page types.

nvd
почти 12 лет назад

The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page table translations for unspecified memory page types.

debian
почти 12 лет назад

The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local g ...

github
больше 3 лет назад

The HVMOP_set_mem_type control in Xen 4.1 through 4.4.x allows local guest HVM administrators to cause a denial of service (hypervisor crash) or possibly execute arbitrary code by leveraging a separate qemu-dm vulnerability to trigger invalid page table translations for unspecified memory page types.

EPSS

Процентиль: 67%
0.00527
Низкий

6.7 Medium

CVSS2

Уязвимость CVE-2014-3124