Описание
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.6.0-1ubuntu2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.4]] |
| precise | released | 4.1.6.1-0ubuntu0.12.04.8 |
| trusty | released | 4.4.2-0ubuntu0.14.04.4 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.4] |
| upstream | needed | |
| vivid | released | 4.5.0-1ubuntu4.4 |
| wily | released | 4.5.1-0ubuntu1.2 |
Показывать по
EPSS
4.7 Medium
CVSS2
Связанные уязвимости
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
The memory_exchange function in common/memory.c in Xen 3.2.x through 4 ...
The memory_exchange function in common/memory.c in Xen 3.2.x through 4.6.x does not properly release locks, which might allow guest OS administrators to cause a denial of service (deadlock or host crash) via unspecified vectors, related to XENMEM_exchange error handling.
EPSS
4.7 Medium
CVSS2