Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wrrw-3jqq-qcvc

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

EPSS

Процентиль: 91%
0.06889
Низкий

Связанные уязвимости

ubuntu
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

redhat
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

nvd
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV guest OS administrators to cause a denial of service (crash) via a crafted GFN that triggers a buffer over-read.

debian
около 13 лет назад

The get_page_from_gfn hypercall function in Xen 4.2 allows local PV gu ...

EPSS

Процентиль: 91%
0.06889
Низкий