Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-496p-qjw4-wrwq

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors, (3) debug registers, and (4) other unspecified registers.

Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors, (3) debug registers, and (4) other unspecified registers.

EPSS

Процентиль: 31%
0.00118
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors, (3) debug registers, and (4) other unspecified registers.

redhat
почти 12 лет назад

Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors, (3) debug registers, and (4) other unspecified registers.

nvd
почти 12 лет назад

Xen 4.4.x, when running on ARM systems, does not properly restrict access to hardware features, which allows local guest users to cause a denial of service (host or guest crash) via unspecified vectors, related to (1) cache control, (2) coprocessors, (3) debug registers, and (4) other unspecified registers.

debian
почти 12 лет назад

Xen 4.4.x, when running on ARM systems, does not properly restrict acc ...

EPSS

Процентиль: 31%
0.00118
Низкий