Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6259

Опубликовано: 26 июл. 2016
Источник: redhat
CVSS3: 6.3
CVSS2: 3.5
EPSS Низкий

Описание

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1355983xen: x86: Missing SMAP whitelisting in 32-bit exception / event delivery (XSA-183)

EPSS

Процентиль: 50%
0.00266
Низкий

6.3 Medium

CVSS3

3.5 Low

CVSS2

Связанные уязвимости

CVSS3: 6.2
ubuntu
больше 9 лет назад

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

CVSS3: 6.2
nvd
больше 9 лет назад

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

CVSS3: 6.2
debian
больше 9 лет назад

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Preven ...

CVSS3: 6.2
github
больше 3 лет назад

Xen 4.5.x through 4.7.x do not implement Supervisor Mode Access Prevention (SMAP) whitelisting in 32-bit exception and event delivery, which allows local 32-bit PV guest OS kernels to cause a denial of service (hypervisor and VM crash) by triggering a safety check.

suse-cvrf
больше 9 лет назад

Security update for xen

EPSS

Процентиль: 50%
0.00266
Низкий

6.3 Medium

CVSS3

3.5 Low

CVSS2