Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Xen‘XEN_DOMCTL_memory_mapping’超极调用输入验证漏洞
Vulnerability Description
Xen是英国剑桥大学开发的一款开源的虚拟机监视器产品。该产品能够使不同和不兼容的操作系统运行在同一台计算机上,并支持在运行时进行迁移,保证正常运行并且避免宕机。 Xen 3.2.x版本至4.5.x版本的‘XEN_DOMCTL_memory_mapping’超极调用中存在安全漏洞,该漏洞源于程序使用PCI透传设备时,MMIO映射操作是不可抢占的。远程攻击者可通过向qemu-dm发送请求利用该漏洞造成拒绝服务(主机CPU消耗)。
CVSS Information
N/A
Vulnerability Type
N/A