Описание
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.8.0-1ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [4.4.2-0ubuntu0.14.04.7]] |
| esm-infra/xenial | released | 4.6.0-1ubuntu4.3 |
| precise | not-affected | 4.1.6.1-0ubuntu0.12.04.12 |
| precise/esm | DNE | precise was not-affected [4.1.6.1-0ubuntu0.12.04.12] |
| trusty | not-affected | 4.4.2-0ubuntu0.14.04.7 |
| trusty/esm | DNE | trusty was not-affected [4.4.2-0ubuntu0.14.04.7] |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3
Связанные уязвимости
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when ...
Xen 4.5.x through 4.7.x on AMD systems without the NRip feature, when emulating instructions that generate software interrupts, allows local HVM guest OS users to cause a denial of service (guest crash) by leveraging an incorrect choice for software interrupt delivery.
EPSS
2.1 Low
CVSS2
5.5 Medium
CVSS3