Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-rf4p-xq4w-3f34

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

EPSS

Процентиль: 32%
0.00122
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

redhat
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

nvd
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

debian
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, wh ...

suse-cvrf
почти 11 лет назад

Security update for xen

EPSS

Процентиль: 32%
0.00122
Низкий

Дефекты

CWE-20