漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.
漏洞信息
N/A
漏洞
N/A
漏洞
Xen 安全漏洞
漏洞信息
Xen是英国等都是英国剑桥(Cambridge)大学的产品。Xen是一款开源的虚拟机监视器产品。Service是一款用于Windows和Linux的计算机监控和教室管理软件。effect等都是的产品。effect是一款用于添加图像效果的软件包。 Xen through 4.14.x 版本存在安全漏洞,该漏洞源于当在cpu之间移动IRQ以分配IRQ处理的负载时,IRQ向量在相关的cpu上动态分配和解除分配。只有当某些限制条件得到满足时,才能解除分配。
漏洞信息
N/A
漏洞
N/A