Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
An issue was discovered in Xen 4.14.x. When moving IRQs between CPUs to distribute the load of IRQ handling, IRQ vectors are dynamically allocated and de-allocated on the relevant CPUs. De-allocation has to happen when certain constraints are met. If these conditions are not met when first checked, the checking CPU may send an interrupt to itself, in the expectation that this IRQ will be delivered only after the condition preventing the cleanup has cleared. For two specific IRQ vectors, this expectation was violated, resulting in a continuous stream of self-interrupts, which renders the CPU effectively unusable. A domain with a passed through PCI device can cause lockup of a physical CPU, resulting in a Denial of Service (DoS) to the entire host. Only x86 systems are vulnerable. Arm systems are not vulnerable. Only guests with physical PCI devices passed through to them can exploit the vulnerability.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Xen 安全漏洞
Vulnerability Description
Xen是英国等都是英国剑桥(Cambridge)大学的产品。Xen是一款开源的虚拟机监视器产品。Service是一款用于Windows和Linux的计算机监控和教室管理软件。effect等都是的产品。effect是一款用于添加图像效果的软件包。 Xen through 4.14.x 版本存在安全漏洞,该漏洞源于当在cpu之间移动IRQ以分配IRQ处理的负载时,IRQ向量在相关的cpu上动态分配和解除分配。只有当某些限制条件得到满足时,才能解除分配。
CVSS Information
N/A
Vulnerability Type
N/A