ID |
CVE-2011-2519
|
Summary |
Xen in the Linux kernel, when running a guest on a host without hardware assisted paging (HAP), allows guest users to cause a denial of service (invalid pointer dereference and hypervisor crash) via the SAHF instruction. |
References |
|
Vulnerable Configurations |
-
cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:x86:*
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:x86:*
-
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:x86:*:*
cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:x86:*:*
-
cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*
-
cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*
-
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
-
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
-
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*
|
CVSS |
Base: | 5.5 (as of 08-12-2020 - 15:25) |
Impact: | |
Exploitability: | |
|
CWE |
CWE-476 |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
ADJACENT_NETWORK |
LOW |
SINGLE |
|
Impact |
Confidentiality | Integrity | Availability |
NONE |
NONE |
COMPLETE |
|
cvss-vector
via4
|
AV:A/AC:L/Au:S/C:N/I:N/A:C
|
redhat
via4
|
advisories | | rpms | - kernel-0:2.6.18-274.3.1.el5
- kernel-PAE-0:2.6.18-274.3.1.el5
- kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5
- kernel-PAE-devel-0:2.6.18-274.3.1.el5
- kernel-debug-0:2.6.18-274.3.1.el5
- kernel-debug-debuginfo-0:2.6.18-274.3.1.el5
- kernel-debug-devel-0:2.6.18-274.3.1.el5
- kernel-debuginfo-0:2.6.18-274.3.1.el5
- kernel-debuginfo-common-0:2.6.18-274.3.1.el5
- kernel-devel-0:2.6.18-274.3.1.el5
- kernel-doc-0:2.6.18-274.3.1.el5
- kernel-headers-0:2.6.18-274.3.1.el5
- kernel-kdump-0:2.6.18-274.3.1.el5
- kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5
- kernel-kdump-devel-0:2.6.18-274.3.1.el5
- kernel-xen-0:2.6.18-274.3.1.el5
- kernel-xen-debuginfo-0:2.6.18-274.3.1.el5
- kernel-xen-devel-0:2.6.18-274.3.1.el5
- kernel-0:2.6.18-238.31.1.el5
- kernel-PAE-0:2.6.18-238.31.1.el5
- kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5
- kernel-PAE-devel-0:2.6.18-238.31.1.el5
- kernel-debug-0:2.6.18-238.31.1.el5
- kernel-debug-debuginfo-0:2.6.18-238.31.1.el5
- kernel-debug-devel-0:2.6.18-238.31.1.el5
- kernel-debuginfo-0:2.6.18-238.31.1.el5
- kernel-debuginfo-common-0:2.6.18-238.31.1.el5
- kernel-devel-0:2.6.18-238.31.1.el5
- kernel-doc-0:2.6.18-238.31.1.el5
- kernel-headers-0:2.6.18-238.31.1.el5
- kernel-kdump-0:2.6.18-238.31.1.el5
- kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5
- kernel-kdump-devel-0:2.6.18-238.31.1.el5
- kernel-xen-0:2.6.18-238.31.1.el5
- kernel-xen-debuginfo-0:2.6.18-238.31.1.el5
- kernel-xen-devel-0:2.6.18-238.31.1.el5
|
|
refmap
via4
|
|
Last major update |
08-12-2020 - 15:25 |
Published |
27-12-2013 - 01:55 |
Last modified |
08-12-2020 - 15:25 |