Описание
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 4.4.1-3ubuntu2 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.1-0ubuntu0.14.04.2]] |
lucid | DNE | |
precise | released | 4.1.6.1-0ubuntu0.12.04.4 |
trusty | released | 4.4.1-0ubuntu0.14.04.2 |
trusty/esm | DNE | trusty was released [4.4.1-0ubuntu0.14.04.2] |
upstream | needed | |
utopic | released | 4.4.1-0ubuntu0.14.10.2 |
vivid | released | 4.4.1-3ubuntu2 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | DNE | |
lucid | ignored | end of life |
precise | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | ignored | end of life |
utopic | DNE | |
vivid | DNE |
Показывать по
EPSS
4.9 Medium
CVSS2
Связанные уязвимости
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, ...
The acceleration support for the "REP MOVS" instruction in Xen 4.4.x, 3.2.x, and earlier lacks properly bounds checking for memory mapped I/O (MMIO) emulated in the hypervisor, which allows local HVM guests to cause a denial of service (host crash) via unspecified vectors.
ELSA-2015-0783: kernel security and bug fix update (IMPORTANT)
EPSS
4.9 Medium
CVSS2