Описание
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.6.0-1ubuntu4 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.5]] |
| precise | released | 4.1.6.1-0ubuntu0.12.04.10 |
| trusty | released | 4.4.2-0ubuntu0.14.04.5 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.5] |
| upstream | needed | |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| wily | released | 4.5.1-0ubuntu1.3 |
Показывать по
EPSS
4.7 Medium
CVSS2
6.3 Medium
CVSS3
Связанные уязвимости
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x th ...
The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.
EPSS
4.7 Medium
CVSS2
6.3 Medium
CVSS3