Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-5511

Опубликовано: 03 дек. 2012
Источник: redhat
CVSS2: 5.5
EPSS Низкий

Описание

Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.

Отчет

Not vulnerable. This issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5. This issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernel-xenNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=877365kernel: xen: several HVM operations do not validate the range of their inputs

EPSS

Процентиль: 26%
0.00093
Низкий

5.5 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.

nvd
около 13 лет назад

Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.

debian
около 13 лет назад

Stack-based buffer overflow in the dirty video RAM tracking functional ...

github
больше 3 лет назад

Stack-based buffer overflow in the dirty video RAM tracking functionality in Xen 3.4 through 4.1 allows local HVM guest OS administrators to cause a denial of service (crash) via a large bitmap image.

suse-cvrf
почти 13 лет назад

Security update for Xen

EPSS

Процентиль: 26%
0.00093
Низкий

5.5 Medium

CVSS2