Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0190

Опубликовано: 13 фев. 2013
Источник: debian
EPSS Низкий

Описание

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed3.2.39-1package
linux-2.6removedpackage
linux-2.6fixed2.6.32-47squeezepackage

EPSS

Процентиль: 15%
0.00048
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.

redhat
больше 12 лет назад

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.

nvd
больше 12 лет назад

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.

github
около 3 лет назад

The xen_failsafe_callback function in Xen for the Linux kernel 2.6.23 and other versions, when running a 32-bit PVOPS guest, allows local users to cause a denial of service (guest crash) by triggering an iret fault, leading to use of an incorrect stack pointer and stack corruption.

oracle-oval
больше 12 лет назад

ELSA-2013-2504: Unbreakable Enterprise kernel security update (MODERATE)

EPSS

Процентиль: 15%
0.00048
Низкий