arch/x86/x86_emulate/x86_emulate.c in Xen 3.2.1 through 4.4.x does not properly check privileges, which allows local HVM guest users to gain privileges or cause a denial of service (crash) via a crafted (1) CALL, (2) JMP, (3) RETF, (4) LCALL, (5) LJMP, or (6) LRET far branch instruction.
This entry has been deprecated. It was originally used for organizing the Development View (CWE-699) and some other views, but it introduced unnecessary complexity and depth to the resulting tree.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201504-04 | vendor advisory |
http://secunia.com/advisories/62672 | third party advisory |
http://support.citrix.com/article/CTX201794 | |
http://support.citrix.com/article/CTX200288 | |
http://www.debian.org/security/2015/dsa-3140 | third party advisory vendor advisory |
http://secunia.com/advisories/62537 | third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html | third party advisory vendor advisory |
http://www.securityfocus.com/bid/71151 | vdb entry |
http://xenbits.xen.org/xsa/advisory-110.html | patch vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html | third party advisory vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/98768 | vdb entry |