Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-5148

Опубликовано: 26 окт. 2014
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.6

Описание

Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.

РелизСтатусПримечание
devel

released

4.5.0-1ubuntu2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.1-0ubuntu0.14.04.3]]
lucid

DNE

precise

not-affected

trusty

released

4.4.1-0ubuntu0.14.04.3
trusty/esm

DNE

trusty was released [4.4.1-0ubuntu0.14.04.3]
upstream

released

4.4.1
utopic

released

4.4.1-0ubuntu0.14.10.3

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

not-affected

precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

ignored

end of life
utopic

DNE

Показывать по

EPSS

Процентиль: 37%
0.00156
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

nvd
больше 11 лет назад

Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.

debian
больше 11 лет назад

Xen 4.4.x, when running on an ARM system and "handling an unknown syst ...

github
больше 3 лет назад

Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.

EPSS

Процентиль: 37%
0.00156
Низкий

4.6 Medium

CVSS2