Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2012-5525

Опубликовано: 03 дек. 2012
Источник: redhat
CVSS2: 6.5
EPSS Низкий

Описание

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

Отчет

Not vulnerable. This issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5. This issue did not affect Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG as we did not have support for Xen hypervisor.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernel-xenNot affected

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=877404kernel: xen: several hypercalls do not validate input GFNs

EPSS

Процентиль: 91%
0.06889
Низкий

6.5 Medium

CVSS2

Связанные уязвимости

ubuntu
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

nvd
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

debian
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV gu ...

github
больше 3 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

EPSS

Процентиль: 91%
0.06889
Низкий

6.5 Medium

CVSS2