Количество 8
Количество 8

CVE-2013-0153
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

CVE-2013-0153
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

CVE-2013-0153
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
CVE-2013-0153
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, wh ...
GHSA-vpjv-xvjr-pg3c
The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.
ELSA-2013-0847
ELSA-2013-0847: kernel security and bug fix update (MODERATE)
ELSA-2013-0847-1
ELSA-2013-0847-1: kernel security and bug fix update (MODERATE)

SUSE-SU-2015:0944-1
Security update for Xen
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2013-0153 The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests. | CVSS2: 4.7 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2013-0153 The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests. | CVSS2: 4.3 | 0% Низкий | больше 12 лет назад |
![]() | CVE-2013-0153 The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests. | CVSS2: 4.7 | 0% Низкий | больше 12 лет назад |
CVE-2013-0153 The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, wh ... | CVSS2: 4.7 | 0% Низкий | больше 12 лет назад | |
GHSA-vpjv-xvjr-pg3c The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests. | 0% Низкий | больше 3 лет назад | ||
ELSA-2013-0847 ELSA-2013-0847: kernel security and bug fix update (MODERATE) | больше 12 лет назад | |||
ELSA-2013-0847-1 ELSA-2013-0847-1: kernel security and bug fix update (MODERATE) | больше 12 лет назад | |||
![]() | SUSE-SU-2015:0944-1 Security update for Xen | больше 12 лет назад |
Уязвимостей на страницу