Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-2752

Опубликовано: 01 апр. 2015
Источник: debian
EPSS Низкий

Описание

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.4.1-9package
xenend-of-lifesqueezepackage

Примечания

  • http://xenbits.xen.org/xsa/advisory-125.html

EPSS

Процентиль: 32%
0.00122
Низкий

Связанные уязвимости

ubuntu
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

redhat
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

nvd
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

github
больше 3 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

suse-cvrf
почти 11 лет назад

Security update for xen

EPSS

Процентиль: 32%
0.00122
Низкий