Описание
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 4.8.0-1ubuntu1 |
esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [4.4.2-0ubuntu0.14.04.7]] |
esm-infra/xenial | not-affected | 4.6.0-1ubuntu4.3 |
precise | not-affected | 4.1.6.1-0ubuntu0.12.04.12 |
precise/esm | DNE | precise was not-affected [4.1.6.1-0ubuntu0.12.04.12] |
trusty | not-affected | 4.4.2-0ubuntu0.14.04.7 |
trusty/esm | DNE | trusty was not-affected [4.4.2-0ubuntu0.14.04.7] |
upstream | needs-triage | |
vivid/stable-phone-overlay | DNE | |
vivid/ubuntu-core | DNE |
Показывать по
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when ...
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging IDT entry miscalculation.
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3