Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-1571

Опубликовано: 22 янв. 2016
Источник: debian
EPSS Низкий

Описание

The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.8.0~rc3-1package
xenend-of-lifesqueezepackage

Примечания

  • http://xenbits.xen.org/xsa/advisory-168.html

EPSS

Процентиль: 53%
0.00297
Низкий

Связанные уязвимости

CVSS3: 6.3
ubuntu
около 10 лет назад

The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.

redhat
около 10 лет назад

The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.

CVSS3: 6.3
nvd
около 10 лет назад

The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.

CVSS3: 6.3
github
больше 3 лет назад

The paging_invlpg function in include/asm-x86/paging.h in Xen 3.3.x through 4.6.x, when using shadow mode paging or nested virtualization is enabled, allows local HVM guest users to cause a denial of service (host crash) via a non-canonical guest address in an INVVPID instruction, which triggers a hypervisor bug check.

suse-cvrf
почти 10 лет назад

Security update for xen

EPSS

Процентиль: 53%
0.00297
Низкий