Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5525

Опубликовано: 13 дек. 2012
Источник: debian
EPSS Низкий

Описание

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xennot-affectedpackage

EPSS

Процентиль: 91%
0.06889
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

redhat
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

nvd
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

github
больше 3 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

EPSS

Процентиль: 91%
0.06889
Низкий