Xen 3.1 through 4.x, when running 64-bit hosts on Intel...
Low severity
Unreviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Jan 28, 2023
Description
Published by the National Vulnerability Database
May 13, 2013
Published to the GitHub Advisory Database
May 17, 2022
Last updated
Jan 28, 2023
Xen 3.1 through 4.x, when running 64-bit hosts on Intel CPUs, does not clear the NT flag when using an IRET after a SYSENTER instruction, which allows PV guest users to cause a denial of service (hypervisor crash) by triggering a #GP fault, which is not properly handled by another IRET instruction.
References