Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-9385

Опубликовано: 23 янв. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9
CVSS3: 6

Описание

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

РелизСтатусПримечание
devel

released

4.8.0-1ubuntu1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.9]]
esm-infra/xenial

released

4.6.0-1ubuntu4.3
precise

not-affected

4.1.6.1-0ubuntu0.12.04.12
precise/esm

DNE

precise was not-affected [4.1.6.1-0ubuntu0.12.04.12]
trusty

released

4.4.2-0ubuntu0.14.04.9
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.9]
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

EPSS

Процентиль: 29%
0.00104
Низкий

4.9 Medium

CVSS2

6 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.8
redhat
около 9 лет назад

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

CVSS3: 6
nvd
около 9 лет назад

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

CVSS3: 6
debian
около 9 лет назад

The x86 segment base write emulation functionality in Xen 4.4.x throug ...

CVSS3: 6
github
больше 3 лет назад

The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.

suse-cvrf
около 9 лет назад

Security update for xen

EPSS

Процентиль: 29%
0.00104
Низкий

4.9 Medium

CVSS2

6 Medium

CVSS3