Описание
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 4.8.0-1ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected] |
esm-infra/xenial | not-affected | 4.6.0-1ubuntu4.3 |
precise | not-affected | |
precise/esm | DNE | precise was not-affected |
trusty | not-affected | |
trusty/esm | DNE | trusty was not-affected |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE |
Показывать по
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD v ...
VMFUNC emulation in Xen 4.6.x through 4.8.x on x86 systems using AMD virtualization extensions (aka SVM) allows local HVM guest OS users to cause a denial of service (hypervisor crash) by leveraging a missing NULL pointer check.
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3