mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
153 lines
4.8 KiB
JSON
153 lines
4.8 KiB
JSON
{
|
|
"CVE_data_meta" : {
|
|
"ASSIGNER" : "cve@mitre.org",
|
|
"ID" : "CVE-2012-5510",
|
|
"STATE" : "PUBLIC"
|
|
},
|
|
"affects" : {
|
|
"vendor" : {
|
|
"vendor_data" : [
|
|
{
|
|
"product" : {
|
|
"product_data" : [
|
|
{
|
|
"product_name" : "n/a",
|
|
"version" : {
|
|
"version_data" : [
|
|
{
|
|
"version_value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format" : "MITRE",
|
|
"data_type" : "CVE",
|
|
"data_version" : "4.0",
|
|
"description" : {
|
|
"description_data" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "Xen 4.x, when downgrading the grant table version, does not properly remove the status page from the tracking list when freeing the page, which allows local guest OS administrators to cause a denial of service (hypervisor crash) via unspecified vectors."
|
|
}
|
|
]
|
|
},
|
|
"problemtype" : {
|
|
"problemtype_data" : [
|
|
{
|
|
"description" : [
|
|
{
|
|
"lang" : "eng",
|
|
"value" : "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references" : {
|
|
"reference_data" : [
|
|
{
|
|
"name" : "[oss-security] 20121203 Xen Security Advisory 26 (CVE-2012-5510) - Grant table version switch list corruption vulnerability",
|
|
"refsource" : "MLIST",
|
|
"url" : "http://www.openwall.com/lists/oss-security/2012/12/03/6"
|
|
},
|
|
{
|
|
"name" : "http://support.citrix.com/article/CTX135777",
|
|
"refsource" : "CONFIRM",
|
|
"url" : "http://support.citrix.com/article/CTX135777"
|
|
},
|
|
{
|
|
"name" : "DSA-2582",
|
|
"refsource" : "DEBIAN",
|
|
"url" : "http://www.debian.org/security/2012/dsa-2582"
|
|
},
|
|
{
|
|
"name" : "GLSA-201309-24",
|
|
"refsource" : "GENTOO",
|
|
"url" : "http://security.gentoo.org/glsa/glsa-201309-24.xml"
|
|
},
|
|
{
|
|
"name" : "SUSE-SU-2012:1615",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00001.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2013:0133",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2013-01/msg00011.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2012:1685",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00018.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2012:1687",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2012-12/msg00019.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2013:0636",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-updates/2013-04/msg00051.html"
|
|
},
|
|
{
|
|
"name" : "openSUSE-SU-2013:0637",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-updates/2013-04/msg00052.html"
|
|
},
|
|
{
|
|
"name" : "SUSE-SU-2014:0446",
|
|
"refsource" : "SUSE",
|
|
"url" : "http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00021.html"
|
|
},
|
|
{
|
|
"name" : "56794",
|
|
"refsource" : "BID",
|
|
"url" : "http://www.securityfocus.com/bid/56794"
|
|
},
|
|
{
|
|
"name" : "88128",
|
|
"refsource" : "OSVDB",
|
|
"url" : "http://www.osvdb.org/88128"
|
|
},
|
|
{
|
|
"name" : "51397",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51397"
|
|
},
|
|
{
|
|
"name" : "51468",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51468"
|
|
},
|
|
{
|
|
"name" : "51486",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51486"
|
|
},
|
|
{
|
|
"name" : "51487",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/51487"
|
|
},
|
|
{
|
|
"name" : "55082",
|
|
"refsource" : "SECUNIA",
|
|
"url" : "http://secunia.com/advisories/55082"
|
|
},
|
|
{
|
|
"name" : "xen-grant-table-dos(80478)",
|
|
"refsource" : "XF",
|
|
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/80478"
|
|
}
|
|
]
|
|
}
|
|
}
|