Описание
Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.5.0-1ubuntu2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.1-0ubuntu0.14.04.3]] |
| lucid | DNE | |
| precise | not-affected | |
| trusty | released | 4.4.1-0ubuntu0.14.04.3 |
| trusty/esm | DNE | trusty was released [4.4.1-0ubuntu0.14.04.3] |
| upstream | released | 4.4.1 |
| utopic | released | 4.4.1-0ubuntu0.14.10.3 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| lucid | not-affected | |
| precise | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | ignored | end of life |
| utopic | DNE |
Показывать по
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
Xen 4.4.x, when running on an ARM system and "handling an unknown syst ...
Xen 4.4.x, when running on an ARM system and "handling an unknown system register access from 64-bit userspace," returns to an instruction of the trap handler for kernel space faults instead of an instruction that is associated with faults in 64-bit userspace, which allows local guest users to cause a denial of service (crash) and possibly gain privileges via a crafted process.
EPSS
4.6 Medium
CVSS2