Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jg3g-vx8c-2j78

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.

The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.

EPSS

Процентиль: 22%
0.00074
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.

redhat
больше 10 лет назад

The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.

nvd
больше 10 лет назад

The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.

debian
больше 10 лет назад

The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way ...

fstec
больше 10 лет назад

Уязвимость гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 22%
0.00074
Низкий