Описание
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.8.0-1ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.9]] |
| esm-infra/xenial | released | 4.6.0-1ubuntu4.3 |
| precise | not-affected | 4.1.6.1-0ubuntu0.12.04.12 |
| precise/esm | DNE | precise was not-affected [4.1.6.1-0ubuntu0.12.04.12] |
| trusty | released | 4.4.2-0ubuntu0.14.04.9 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.9] |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
EPSS
4.9 Medium
CVSS2
6 Medium
CVSS3
Связанные уязвимости
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
The x86 segment base write emulation functionality in Xen 4.4.x throug ...
The x86 segment base write emulation functionality in Xen 4.4.x through 4.7.x allows local x86 PV guest OS administrators to cause a denial of service (host crash) by leveraging lack of canonical address checks.
EPSS
4.9 Medium
CVSS2
6 Medium
CVSS3