Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/92130 | vdb entry third party advisory |
http://support.citrix.com/article/CTX214954 | vendor advisory |
http://www.securitytracker.com/id/1036447 | vdb entry third party advisory |
http://xenbits.xen.org/xsa/xsa183-unstable.patch | patch mitigation |
http://xenbits.xen.org/xsa/advisory-183.html | mailing list patch |
http://xenbits.xen.org/xsa/xsa183-4.6.patch | patch mitigation |