The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 3.3.x through 4.4.x does not check the supervisor mode permissions for instructions that generate software interrupts, which allows local HVM guest users to cause a denial of service (guest crash) via unspecified vectors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00003.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140483.html | vendor advisory |
http://xenbits.xen.org/xsa/advisory-106.html | patch vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00002.html | vendor advisory |
http://support.citrix.com/article/CTX200218 | |
http://www.securityfocus.com/bid/70062 | vdb entry |
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140418.html | vendor advisory |
http://www.securitytracker.com/id/1030889 | vdb entry |
http://www.debian.org/security/2014/dsa-3041 | vendor advisory |
http://secunia.com/advisories/61858 | third party advisory |
http://secunia.com/advisories/61890 | third party advisory |
http://secunia.com/advisories/61500 | third party advisory |
http://security.gentoo.org/glsa/glsa-201412-42.xml | vendor advisory |