4.7 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:N/I:N/A:C
0.001 Low
EPSS
Percentile
25.6%
The do_tmem_get function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 allow local guest OS users to cause a denial of service (CPU hang and host crash) via unspecified vectors related to a spinlock being held in the “bad_copy error path.” NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 11 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 10 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 999 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |
Debian | 13 | all | xen | < 4.1.4-1 | xen_4.1.4-1_all.deb |