Описание
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.4.1-3ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.0-0ubuntu5.2]] |
| lucid | DNE | |
| precise | released | 4.1.6.1-0ubuntu0.12.04.3 |
| trusty | released | 4.4.0-0ubuntu5.2 |
| trusty/esm | DNE | trusty was released [4.4.0-0ubuntu5.2] |
| upstream | needs-triage | |
| utopic | released | 4.4.0-0ubuntu8 |
| vivid | released | 4.4.1-3ubuntu1 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| lucid | ignored | end of life |
| precise | DNE | |
| trusty | DNE | |
| trusty/esm | DNE | |
| upstream | ignored | end of life |
| utopic | DNE | |
| vivid | DNE |
Показывать по
EPSS
5.8 Medium
CVSS2
Связанные уязвимости
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen ...
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
EPSS
5.8 Medium
CVSS2