Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-3713

Опубликовано: 27 июн. 2016
Источник: debian
EPSS Низкий

Описание

The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.5.4-1package
linuxnot-affectedjessiepackage
linuxnot-affectedwheezypackage

Примечания

  • Introduced by: https://git.kernel.org/linus/910a6aae4e2e45855efc4a268e43eed2d8445575 (v4.2-rc1)

  • https://bugzilla.redhat.com/show_bug.cgi?id=1332139

EPSS

Процентиль: 28%
0.00097
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
почти 9 лет назад

The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.

redhat
около 9 лет назад

The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.

CVSS3: 7.1
nvd
почти 9 лет назад

The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.

CVSS3: 7.1
github
около 3 лет назад

The msr_mtrr_valid function in arch/x86/kvm/mtrr.c in the Linux kernel before 4.6.1 supports MSR 0x2f8, which allows guest OS users to read or write to the kvm_arch_vcpu data structure, and consequently obtain sensitive information or cause a denial of service (system crash), via a crafted ioctl call.

oracle-oval
больше 6 лет назад

ELSA-2018-4301: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 28%
0.00097
Низкий