Описание
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Ссылки
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing ListPatch
- MitigationPatch
- MitigationPatch
- Vendor Advisory
- Third Party Advisory
- Third Party Advisory
- Mailing ListPatch
- MitigationPatch
- MitigationPatch
Уязвимые конфигурации
Одно из
Одно из
EPSS
6.2 Medium
CVSS3
4.9 Medium
CVSS2
Дефекты
Связанные уязвимости
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Preven ...
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
EPSS
6.2 Medium
CVSS3
4.9 Medium
CVSS2