Description
The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
Published: 2014-10-02
Score: 5.8 Medium
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-3041-1 xen security update
EUVD EUVD EUVD-2014-7032 The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
History

No history.

Subscriptions

Debian Debian Linux
Fedoraproject Fedora
Opensuse Opensuse
Xen Xen
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T12:40:19.135Z

Reserved: 2014-09-24T00:00:00.000Z

Link: CVE-2014-7155

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-10-02T14:55:05.120

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-7155

cve-icon Redhat

Severity : Important

Publid Date: 2014-09-23T00:00:00Z

Links: CVE-2014-7155 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses