Описание
VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.6.0-1ubuntu4 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.5]] |
| precise | released | 4.1.6.1-0ubuntu0.12.04.10 |
| trusty | released | 4.4.2-0ubuntu0.14.04.5 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.5] |
| upstream | needed | |
| vivid | ignored | end of life |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| wily | released | 4.5.1-0ubuntu1.3 |
Показывать по
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows ...
VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
Уязвимость гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании
2.1 Low
CVSS2
5.5 Medium
CVSS3