CVE-2012-6033

EUVD-2012-5907
The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors.  NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
Base Score
CVSS 3.x
EPSS Score
Percentile: 21%
Affected Products (NVD)
VendorProductVersion
xenxen
4.0.0
xenxen
4.1.0
xenxen
4.2.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xen
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
bullseye
4.14.6-1
fixed
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
squeeze
no-dsa
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xen
hardy
dne
lucid
dne
natty
dne
oneiric
ignored
precise
ignored
quantal
ignored
xen-3.1
hardy
not-affected
lucid
dne
natty
dne
oneiric
dne
precise
dne
quantal
dne
xen-3.2
hardy
not-affected
lucid
dne
natty
dne
oneiric
dne
precise
dne
quantal
dne
xen-3.3
hardy
dne
lucid
not-affected
natty
ignored
oneiric
dne
precise
dne
quantal
dne
Common Weakness Enumeration