Описание
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.7.0-0ubuntu2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [4.4.2-0ubuntu0.14.04.6]] |
| esm-infra/xenial | released | 4.6.0-1ubuntu4.2 |
| precise | not-affected | 4.1.6.1-0ubuntu0.12.04.11 |
| trusty | not-affected | 4.4.2-0ubuntu0.14.04.6 |
| trusty/esm | DNE | trusty was not-affected [4.4.2-0ubuntu0.14.04.6] |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| wily | ignored | end of life |
Показывать по
EPSS
4.9 Medium
CVSS2
6.2 Medium
CVSS3
Связанные уязвимости
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Preven ...
Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
EPSS
4.9 Medium
CVSS2
6.2 Medium
CVSS3