Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-2752

Опубликовано: 01 апр. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9

Описание

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

РелизСтатусПримечание
devel

released

4.5.0-1ubuntu4
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.1-0ubuntu0.14.04.5]]
lucid

DNE

precise

released

4.1.6.1-0ubuntu0.12.04.6
trusty

released

4.4.1-0ubuntu0.14.04.5
trusty/esm

DNE

trusty was released [4.4.1-0ubuntu0.14.04.5]
upstream

needs-triage

utopic

released

4.4.1-0ubuntu0.14.10.5
vivid

released

4.5.0-1ubuntu4

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

ignored

end of life
utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 32%
0.00122
Низкий

4.9 Medium

CVSS2

Связанные уязвимости

redhat
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

nvd
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

debian
почти 11 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, wh ...

github
больше 3 лет назад

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

suse-cvrf
почти 11 лет назад

Security update for xen

EPSS

Процентиль: 32%
0.00122
Низкий

4.9 Medium

CVSS2