漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
The (1) memc_save_get_next_page, (2) tmemc_restore_put_page and (3) tmemc_restore_flush_page functions in the Transcendent Memory (TMEM) in Xen 4.0, 4.1, and 4.2 do not check for negative id pools, which allows local guest OS users to cause a denial of service (memory corruption and host crash) or possibly execute arbitrary code via unspecified vectors. NOTE: this issue was originally published as part of CVE-2012-3497, which was too general; CVE-2012-3497 has been SPLIT into this ID and others.
漏洞信息
N/A
漏洞
N/A
漏洞
Xen Transcendent Memory 拒绝服务漏洞
漏洞信息
Xen是英国剑桥大学开发的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen 4.0,4.1,4.2版本中的Transcendent Memory (TMEM)中的(1)memc_save_get_next_page(2)tmemc_restore_put_page以及(3)tmemc_restore_flush_page函数中存在漏洞,该漏洞源于没有检查负的id池。本地访客攻击者利用该漏洞通过未明向量导致拒绝服务
漏洞信息
N/A
漏洞
N/A