Unrated severityNVD Advisory· Published Apr 1, 2015· Updated May 6, 2026
CVE-2015-2752
CVE-2015-2752
Description
The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x through 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- xenbits.xen.org/xsa/advisory-125.htmlnvdPatchVendor Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-April/154574.htmlnvdThird Party Advisory
- lists.fedoraproject.org/pipermail/package-announce/2015-April/154579.htmlnvdThird Party Advisory
- www.securitytracker.com/id/1031994nvdThird Party AdvisoryVDB Entry
- lists.fedoraproject.org/pipermail/package-announce/2015-April/155198.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-04/msg00014.htmlnvd
- lists.opensuse.org/opensuse-security-announce/2015-05/msg00018.htmlnvd
- www.securityfocus.com/bid/73448nvd
- security.gentoo.org/glsa/201504-04nvd
News mentions
0No linked articles in our index yet.