CVE-2013-0153 in Xen信息

摘要 (英语)

The AMD IOMMU support in Xen 4.2.x, 4.1.x, 3.3, and other versions, when using AMD-Vi for PCI passthrough, uses the same interrupt remapping table for the host and all guests, which allows guests to cause a denial of service by injecting an interrupt into other guests.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

预定

2012-12-06

披露

2013-02-14

状态

已确认

条目

VulDB provides additional information and datapoints for this CVE:

来源

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!