Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-36h3-x748-qfw8

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

EPSS

Процентиль: 26%
0.00084
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

redhat
почти 14 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

nvd
больше 11 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extension is enabled, does not properly handle cpuid instruction emulation when exiting the VM, which allows local guest users to cause a denial of service (guest crash) via unspecified vectors.

debian
больше 11 лет назад

Xen, when using x86 Intel processors and the VMX virtualization extens ...

oracle-oval
почти 14 лет назад

ELSA-2011-0927: kernel security and bug fix update (IMPORTANT)

EPSS

Процентиль: 26%
0.00084
Низкий