Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2xpm-w5mr-rm8m

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."

Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."

EPSS

Процентиль: 70%
0.00628
Низкий

Связанные уязвимости

ubuntu
около 12 лет назад

Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."

redhat
около 12 лет назад

Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."

nvd
около 12 лет назад

Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does not properly flush the TLB after clearing a present translation table entry, which allows local guest administrators to cause a denial of service or gain privileges via unspecified vectors related to an "inverted boolean parameter."

debian
около 12 лет назад

Xen 4.2.x and 4.3.x, when using Intel VT-d for PCI passthrough, does n ...

EPSS

Процентиль: 70%
0.00628
Низкий