Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r57q-666q-xr8j

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

EPSS

Процентиль: 53%
0.00305
Низкий

Связанные уязвимости

ubuntu
почти 12 лет назад

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

redhat
почти 12 лет назад

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

nvd
почти 12 лет назад

Xen 4.4.x, when running on an ARM system, does not properly context switch the CNTKCTL_EL1 register, which allows local guest users to modify the hardware timers and cause a denial of service (crash) via unspecified vectors.

debian
почти 12 лет назад

Xen 4.4.x, when running on an ARM system, does not properly context sw ...

EPSS

Процентиль: 53%
0.00305
Низкий