Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-3125

Опубликовано: 30 апр. 2014
Источник: redhat
CVSS2: 5
EPSS Низкий

Описание

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

Отчет

Not vulnerable. This issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernel-xenNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1088585xen: arm: Hardware timer context is not properly context switched (xsa-91)

EPSS

Процентиль: 53%
0.00305
Низкий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 12 лет назад

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

nvd
почти 12 лет назад

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

debian
почти 12 лет назад

Xen 4.4.x, when running on an ARM system, does not properly context sw ...

github
больше 3 лет назад

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

EPSS

Процентиль: 53%
0.00305
Низкий

5 Medium

CVSS2