Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wmqh-ggr8-mwm7

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.

Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.

EPSS

Процентиль: 58%
0.00363
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.

redhat
около 13 лет назад

Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.

nvd
почти 13 лет назад

Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, does not properly configure VT-d when supporting a device that is behind a legacy PCI Bridge, which allows local guests to cause a denial of service to other guests by injecting an interrupt.

debian
почти 13 лет назад

Xen 4.2.x, 4.1.x, and 4.0, when using Intel VT-d for PCI passthrough, ...

suse-cvrf
почти 13 лет назад

Security update for Xen

EPSS

Процентиль: 58%
0.00363
Низкий