Max CVSS | 10.0 | Min CVSS | 4.1 | Total Count | 2 |
ID | CVSS | Summary | Last (major) update | Published | |
CVE-2010-0298 | 6.5 |
The x86 emulator in KVM 83 does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) in determining the memory access available to CPL3 code, which allows guest OS users to cause a denial of service (guest OS crash) or gain privil
|
27-06-2024 - 19:17 | 12-02-2010 - 19:30 | |
CVE-2009-4272 | 7.8 |
A certain Red Hat patch for net/ipv4/route.c in the Linux kernel 2.6.18 on Red Hat Enterprise Linux (RHEL) 5 allows remote attackers to cause a denial of service (deadlock) via crafted packets that force collisions in the IPv4 routing hash table, and
|
15-02-2024 - 20:47 | 27-01-2010 - 17:30 | |
CVE-2010-0309 | 6.8 |
The pit_ioport_read function in the Programmable Interval Timer (PIT) emulation in i8254.c in KVM 83 does not properly use the pit_state data structure, which allows guest OS users to cause a denial of service (host OS crash or hang) by attempting to
|
13-02-2023 - 04:15 | 12-02-2010 - 19:30 | |
CVE-2007-4567 | 7.8 |
The ipv6_hop_jumbo function in net/ipv6/exthdrs.c in the Linux kernel before 2.6.22 does not properly validate the hop-by-hop IPv6 extended header, which allows remote attackers to cause a denial of service (NULL pointer dereference and kernel panic)
|
13-02-2023 - 02:18 | 21-12-2007 - 00:46 | |
CVE-2009-4538 | 10.0 |
drivers/net/e1000e/netdev.c in the e1000e driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to have an unspecified impact via crafted packets, a r
|
16-11-2018 - 15:53 | 12-01-2010 - 17:30 | |
CVE-2009-4537 | 7.8 |
drivers/net/r8169.c in the r8169 driver in the Linux kernel 2.6.32.3 and earlier does not properly check the size of an Ethernet frame that exceeds the MTU, which allows remote attackers to (1) cause a denial of service (temporary network outage) via
|
16-11-2018 - 15:52 | 12-01-2010 - 17:30 | |
CVE-2009-4536 | 7.8 |
drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypas
|
16-11-2018 - 15:51 | 12-01-2010 - 17:30 | |
CVE-2010-0306 | 4.1 |
The x86 emulator in KVM 83, when a guest is configured for Symmetric Multiprocessing (SMP), does not use the Current Privilege Level (CPL) and I/O Privilege Level (IOPL) to restrict instruction execution, which allows guest OS users to cause a denial
|
19-09-2017 - 01:30 | 12-02-2010 - 19:30 |