Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2014-7155

Опубликовано: 02 окт. 2014
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 5.8

Описание

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.

РелизСтатусПримечание
devel

released

4.4.1-3ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.0-0ubuntu5.2]]
lucid

DNE

precise

released

4.1.6.1-0ubuntu0.12.04.3
trusty

released

4.4.0-0ubuntu5.2
trusty/esm

DNE

trusty was released [4.4.0-0ubuntu5.2]
upstream

needs-triage

utopic

released

4.4.0-0ubuntu8
vivid

released

4.4.1-3ubuntu1

Показывать по

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

DNE

lucid

ignored

end of life
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

ignored

end of life
utopic

DNE

vivid

DNE

Показывать по

EPSS

Процентиль: 77%
0.01034
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

redhat
больше 11 лет назад

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.

nvd
больше 11 лет назад

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.

debian
больше 11 лет назад

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen ...

github
больше 3 лет назад

The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.

suse-cvrf
около 13 лет назад

Security update for Xen

EPSS

Процентиль: 77%
0.01034
Низкий

5.8 Medium

CVSS2