Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-7j5g-cw5c-pc6m

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

EPSS

Процентиль: 85%
0.02548
Низкий

Связанные уязвимости

ubuntu
больше 11 лет назад

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

redhat
больше 11 лет назад

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

nvd
больше 11 лет назад

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 through 4.4.x uses an improper MSR range for x2APIC emulation, which allows local HVM guests to cause a denial of service (host crash) or read data from the hypervisor or other guests via unspecified vectors.

debian
больше 11 лет назад

The hvm_msr_read_intercept function in arch/x86/hvm/hvm.c in Xen 4.1 t ...

EPSS

Процентиль: 85%
0.02548
Низкий