Описание
Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.6.0-1ubuntu5 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.6]] |
| esm-infra/xenial | released | 4.6.0-1ubuntu4.1 |
| precise | released | 4.1.6.1-0ubuntu0.12.04.11 |
| trusty | released | 4.4.2-0ubuntu0.14.04.6 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.6] |
| upstream | needed | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE | |
| wily | released | 4.5.1-0ubuntu1.4 |
Показывать по
7.2 High
CVSS2
8.8 High
CVSS3
Связанные уязвимости
Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
Integer overflow in the x86 shadow pagetable code in Xen allows local ...
Integer overflow in the x86 shadow pagetable code in Xen allows local guest OS users to cause a denial of service (host crash) or possibly gain privileges by shadowing a superpage mapping.
Уязвимость гипервизора Xen, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
7.2 High
CVSS2
8.8 High
CVSS3