Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-567h-gr95-57mc

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

EPSS

Процентиль: 69%
0.00617
Низкий

Связанные уязвимости

ubuntu
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

redhat
больше 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

nvd
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough on Intel VT-d chipsets that do not have interrupt remapping, allows guest OS users to gain host OS privileges by "using DMA to generate MSI interrupts by writing to the interrupt injection registers."

debian
почти 14 лет назад

Xen 4.1 before 4.1.1 and 4.0 before 4.0.2, when using PCI passthrough ...

oracle-oval
больше 13 лет назад

ELSA-2011-1479: kernel security, bug fix, and enhancement update (IMPORTANT)

EPSS

Процентиль: 69%
0.00617
Низкий