CVE-2015-2752

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.9 UNKNOWN
LOCAL
LOW
AV:L/AC:L/Au:N/C:N/I:N/A:C
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 32%
VendorProductVersion
xenxen
4.3.0
xenxen
4.3.1
xenxen
4.3.2
xenxen
4.4.0
xenxen
4.4.1
xenxen
4.5.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
xen
bullseye
4.14.6-1
fixed
bullseye (security)
4.14.5+94-ge49571868d-1
fixed
bookworm
4.17.3+10-g091466ba55-1~deb12u1
fixed
sid
4.17.3+36-g54dacb5c02-1
fixed
trixie
4.17.3+36-g54dacb5c02-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
xen
vivid
Fixed 4.5.0-1ubuntu4
released
utopic
Fixed 4.4.1-0ubuntu0.14.10.5
released
trusty
Fixed 4.4.1-0ubuntu0.14.04.5
released
precise
Fixed 4.1.6.1-0ubuntu0.12.04.6
released
lucid
dne
xen-3.3
vivid
dne
utopic
dne
trusty
dne
precise
dne
lucid
ignored