The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-479-1 | xen security update |
EUVD |
EUVD-2015-2842 | The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm). |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T05:24:38.745Z
Reserved: 2015-03-26T00:00:00
Link: CVE-2015-2752
No data.
Status : Deferred
Published: 2015-04-01T14:59:06.693
Modified: 2025-04-12T10:46:40.837
Link: CVE-2015-2752
OpenCVE Enrichment
No data.
Debian DLA
EUVD