Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-1763

Опубликовано: 31 мая 2011
Источник: redhat
CVSS2: 6.5
EPSS Низкий

Описание

The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.

Отчет

This issue only affects Red Hat Enterprise Linux 5 as we did not backport upstream Xen unstable commit 2dcdd2fcb945. The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected.

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=701240kernel: xen: improper upper boundary check in get_free_port() function

EPSS

Процентиль: 25%
0.00081
Низкий

6.5 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.

nvd
больше 11 лет назад

The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.

debian
больше 11 лет назад

The get_free_port function in Xen allows local authenticated DomU user ...

github
около 3 лет назад

The get_free_port function in Xen allows local authenticated DomU users to cause a denial of service or possibly gain privileges via unspecified vectors involving a new event channel port.

oracle-oval
около 14 лет назад

ELSA-2011-0833: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 25%
0.00081
Низкий

6.5 Medium

CVSS2

Уязвимость CVE-2011-1763