0.001
EPSS

CVE-2015-2752

CVSSv4: NA | CVSSv3: 4.3 | CVSSv2: 4.9 | VMScore: 590 | EPSS: 0.00122 | KEV: Not Included
Published: 01/04/2015 Updated: 12/04/2025

Vulnerability Summary

The XEN_DOMCTL_memory_mapping hypercall in Xen 3.2.x up to and including 4.5.x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm).

Vulnerable Product Search on Vulmon Subscribe to Product

fedoraproject fedora 20

fedoraproject fedora 21

xen xen 4.3.0

xen xen 4.3.1

xen xen 4.3.2

xen xen 4.4.0

xen xen 4.4.1

xen xen 4.5.0

Vendor Advisories

Debian Bug report logs - #781620 CVE-2015-2751 CVE-2015-2752 CVE-2015-2756 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 31 Mar 2015 17:15:02 UTC Severity: important Tags: fixed-upstream, security, upstr ...
Debian Bug report logs - #780975 CVE-2015-2152 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 22 Mar 2015 18:03:01 UTC Severity: important Tags: security Fixed in version xen/441-9 Done: Bastian Blank ...
Debian Bug report logs - #781620 CVE-2015-2751 CVE-2015-2752 CVE-2015-2756 Package: src:xen; Maintainer for src:xen is Debian Xen Team <pkg-xen-devel@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Tue, 31 Mar 2015 17:15:02 UTC Severity: important Tags: fixed-upstream, security, upstr ...
The XEN_DOMCTL_memory_mapping hypercall in Xen 32x through 45x, when using a PCI passthrough device, is not preemptible, which allows local x86 HVM domain users to cause a denial of service (host CPU consumption) via a crafted request to the device model (qemu-dm) ...