Описание
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.5.0-1ubuntu2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.1-0ubuntu0.14.04.3]] |
| lucid | DNE | |
| precise | not-affected | |
| trusty | released | 4.4.1-0ubuntu0.14.04.3 |
| trusty/esm | DNE | trusty was released [4.4.1-0ubuntu0.14.04.3] |
| upstream | released | 4.4.1 |
| utopic | released | 4.4.1-0ubuntu0.14.10.3 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| lucid | not-affected | |
| precise | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | ignored | end of life |
| utopic | DNE |
Показывать по
4.3 Medium
CVSS2
Связанные уязвимости
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not pro ...
Xen 4.4.x, when running a 64-bit kernel on an ARM system, does not properly handle traps from the guest domain that use a different address width, which allows local guest users to cause a denial of service (host crash) via a crafted 32-bit process.
4.3 Medium
CVSS2