Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6259

Опубликовано: 02 авг. 2016
Источник: debian
EPSS Низкий

Описание

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.8.0~rc3-1package
xennot-affectedjessiepackage
xennot-affectedwheezypackage

Примечания

  • http://xenbits.xen.org/xsa/advisory-183.html

EPSS

Процентиль: 50%
0.00266
Низкий

Связанные уязвимости

CVSS3: 6.2
ubuntu
больше 9 лет назад

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

CVSS3: 6.3
redhat
больше 9 лет назад

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

CVSS3: 6.2
nvd
больше 9 лет назад

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

CVSS3: 6.2
github
больше 3 лет назад

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

suse-cvrf
больше 9 лет назад

Security update for xen

EPSS

Процентиль: 50%
0.00266
Низкий