Xen 3.0.3 through 4.1.x (possibly 4.1.6.1), 4.2.x (possibly 4.2.3), and 4.3.x (possibly 4.3.1) does not properly prevent access to hypercalls, which allows local guest users to gain privileges via a crafted application running in ring 1 or 2.
Publish Date : 2013-12-24 Last Update Date : 2017-01-07
Title |
Definition Id |
Class |
Family |
DEPRECATED: ELSA-2014-0285 -- kernel security, bug fix, and enhancement update (important) |
oval:org.mitre.oval:def:27368 |
|
unix |
ELSA-2014-0285-1 -- kernel security, bug fix, and enhancement update (important) |
oval:org.mitre.oval:def:27275 |
|
unix |
ELSA-2014:0285: kernel security, bug fix, and enhancement update (Important) |
oval:org.mitre.oval:def:23863 |
|
unix |
RHSA-2014:0285: kernel security, bug fix, and enhancement update (Important) |
oval:org.mitre.oval:def:24254 |
|
unix |
RHSA-2014:0285: kernel security, bug fix, and enhancement update (Important) |
oval:com.redhat.rhsa:def:20140285 |
|
unix |
SUSE-SU-2013:1923-1 -- Security update for Xen |
oval:org.mitre.oval:def:25687 |
|
unix |
SUSE-SU-2014:0372-1 -- Security update for Xen |
oval:org.mitre.oval:def:25302 |
|
unix |
SUSE-SU-2014:0446-1 -- Security update for Xen |
oval:org.mitre.oval:def:25115 |
|
unix |
SUSE-SU-2014:0411-1 -- Security update for Xen |
oval:org.mitre.oval:def:25518 |
|
unix |
SUSE-SU-2014:0470-1 -- Security update for Xen |
oval:org.mitre.oval:def:25516 |
|
unix |
|
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify
a vulnerability or a missing patch. Check out the OVAL definitions
if you want to learn what you should do to verify a vulnerability.