CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:N/I:N/A:C
AI Score
Confidence
High
EPSS
Percentile
78.5%
The do_mmu_update function in arch/x86/mm.c in Xen 4.x through 4.4.x does not properly restrict updates to only PV page tables, which allows remote PV guests to cause a denial of service (NULL pointer dereference) by leveraging hardware emulation services for HVM guests using Hardware Assisted Paging (HAP).
Vendor | Product | Version | CPE |
---|---|---|---|
opensuse | opensuse | 13.1 | cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:* |
opensuse | opensuse | 13.2 | cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:* |
debian | debian_linux | 7.0 | cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |
xen | xen | 4.0.0 | cpe:2.3:o:xen:xen:4.0.0:*:*:*:*:*:*:* |
xen | xen | 4.0.1 | cpe:2.3:o:xen:xen:4.0.1:*:*:*:*:*:*:* |
xen | xen | 4.0.2 | cpe:2.3:o:xen:xen:4.0.2:*:*:*:*:*:*:* |
xen | xen | 4.0.3 | cpe:2.3:o:xen:xen:4.0.3:*:*:*:*:*:*:* |
xen | xen | 4.0.4 | cpe:2.3:o:xen:xen:4.0.4:*:*:*:*:*:*:* |
xen | xen | 4.1.0 | cpe:2.3:o:xen:xen:4.1.0:*:*:*:*:*:*:* |
xen | xen | 4.1.1 | cpe:2.3:o:xen:xen:4.1.1:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2015-02/msg00005.html
lists.opensuse.org/opensuse-security-announce/2015-02/msg00010.html
secunia.com/advisories/62672
www.debian.org/security/2015/dsa-3140
www.securityfocus.com/bid/71149
xenbits.xen.org/xsa/advisory-109.html
exchange.xforce.ibmcloud.com/vulnerabilities/98767
security.gentoo.org/glsa/201504-04