Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h2f3-x3v9-p3c5

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

EPSS

Процентиль: 35%
0.00141
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

redhat
больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

nvd
больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and (3) XENMEM_exchange hypercalls in Xen 4.2 and earlier allow local guest administrators to cause a denial of service (long loop and hang) via a crafted extent_order value.

debian
больше 12 лет назад

The (1) XENMEM_decrease_reservation, (2) XENMEM_populate_physmap, and ...

oracle-oval
больше 12 лет назад

ELSA-2013-0168: kernel security and bug fix update (MODERATE)

EPSS

Процентиль: 35%
0.00141
Низкий