CVE-2012-6033

The do_tmem_control function in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 does not properly check privileges, which allows local guest OS users to access control stack operations via unspecified vectors.  NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.4 UNKNOWN
LOCAL
MEDIUM
AV:L/AC:M/Au:N/C:P/I:P/A:P
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 22%
VendorProductVersion
xenxen
4.0.0
xenxen
4.1.0
xenxen
4.2.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xen
bullseye
4.14.6-1
fixed
squeeze
no-dsa
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xen
quantal
ignored
precise
ignored
oneiric
ignored
natty
dne
lucid
dne
hardy
dne
xen-3.1
quantal
dne
precise
dne
oneiric
dne
natty
dne
lucid
dne
hardy
not-affected
xen-3.2
quantal
dne
precise
dne
oneiric
dne
natty
dne
lucid
dne
hardy
not-affected
xen-3.3
quantal
dne
precise
dne
oneiric
dne
natty
ignored
lucid
not-affected
hardy
dne
Common Weakness Enumeration