Описание
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 4.5.1-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.2]] |
| precise | released | 4.1.6.1-0ubuntu0.12.04.6 |
| trusty | released | 4.4.2-0ubuntu0.14.04.2 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.2] |
| upstream | needs-triage | |
| utopic | ignored | end of life |
| vivid | released | 4.5.0-1ubuntu4.2 |
| wily | not-affected | 4.5.1-0ubuntu1 |
Показывать по
4.9 Medium
CVSS2
Связанные уязвимости
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way ...
The compat_iret function in Xen 3.1 through 4.5 iterates the wrong way through a loop, which allows local 32-bit PV guest administrators to cause a denial of service (large loop and system hang) via a hypercall_iret call with EFLAGS.VM set.
Уязвимость гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании
4.9 Medium
CVSS2