Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vpjv-xvjr-pg3c

Опубликовано: 05 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

EPSS

Процентиль: 32%
0.00119
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

redhat
больше 12 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

nvd
больше 12 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

debian
больше 12 лет назад

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, wh ...

oracle-oval
больше 12 лет назад

ELSA-2013-0847: kernel security and bug fix update (MODERATE)

EPSS

Процентиль: 32%
0.00119
Низкий