Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-9381

Опубликовано: 23 янв. 2017
Источник: debian
EPSS Низкий

Описание

Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.4.0-1package

Примечания

  • Xen switched to qemu-system in 4.4.0-1

  • https://xenbits.xen.org/xsa/advisory-197.html

EPSS

Процентиль: 29%
0.00105
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 9 лет назад

Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.

CVSS3: 7.5
redhat
около 9 лет назад

Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.

CVSS3: 7.5
nvd
около 9 лет назад

Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.

CVSS3: 7.5
github
больше 3 лет назад

Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.

suse-cvrf
около 9 лет назад

Security update for qemu

EPSS

Процентиль: 29%
0.00105
Низкий