Red Hat Virtualization 5.0

CPE Details

Red Hat Virtualization 5.0
5.0
2020-08-11
13h57 +00:00
2020-08-11
13h57 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:redhat:virtualization:5.0:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

virtualization

Version

5.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2012-3515 2012-11-23 19h00 +00:00 Qemu, as used in Xen 4.0, 4.1 and possibly other products, when emulating certain devices with a virtual console backend, allows local OS guest users to gain privileges via a crafted escape VT100 sequence that triggers the overwrite of a "device model's address space."
7.2
CVE-2009-4272 2010-01-27 16h00 +00:00 A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and trigger a routing "emergency" in which a hash chain is too long. NOTE: this is related to an issue in the Linux kernel before 2.6.31, when the kernel routing cache is disabled, involving an uninitialized pointer and a panic.
7.5
High
CVE-2009-3080 2009-11-20 16h00 +00:00 Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.
7.2