Описание
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.8.0-1ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.9]] |
| esm-infra/xenial | released | 4.6.0-1ubuntu4.3 |
| precise | released | 4.1.6.1-0ubuntu0.12.04.13 |
| precise/esm | DNE | precise was released [4.1.6.1-0ubuntu0.12.04.13] |
| trusty | released | 4.4.2-0ubuntu0.14.04.9 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.9] |
| upstream | needed | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
4.6 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, whic ...
Xen 4.0.x through 4.7.x mishandle x86 task switches to VM86 mode, which allows local 32-bit x86 HVM guest OS users to gain privileges or cause a denial of service (guest OS crash) by leveraging a guest operating system that uses hardware task switching and allows a new task to start in VM86 mode.
4.6 Medium
CVSS2
7.8 High
CVSS3