The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-3041-1 xen security update
EUVD EUVD EUVD-2014-7032 The x86_emulate function in arch/x86/x86_emulate/x86_emulate.c in Xen 4.4.x and earlier does not properly check supervisor mode permissions, which allows local HVM users to cause a denial of service (guest crash) or gain guest kernel mode privileges via vectors involving an (1) HLT, (2) LGDT, (3) LIDT, or (4) LMSW instruction.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T12:40:19.135Z

Reserved: 2014-09-24T00:00:00

Link: CVE-2014-7155

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-10-02T14:55:05.120

Modified: 2025-04-12T10:46:40.837

Link: CVE-2014-7155

cve-icon Redhat

Severity : Important

Publid Date: 2014-09-23T00:00:00Z

Links: CVE-2014-7155 - Bugzilla

cve-icon OpenCVE Enrichment

No data.