Описание
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.8.0-1ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.9]] |
| esm-infra/xenial | released | 4.6.0-1ubuntu4.3 |
| precise | released | 4.1.6.1-0ubuntu0.12.04.13 |
| precise/esm | DNE | precise was released [4.1.6.1-0ubuntu0.12.04.13] |
| trusty | released | 4.4.2-0ubuntu0.14.04.9 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.9] |
| upstream | needs-triage | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
2.1 Low
CVSS2
3.3 Low
CVSS3
Связанные уязвимости
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows l ...
CMPXCHG8B emulation in Xen 3.3.x through 4.7.x on x86 systems allows local HVM guest OS users to obtain sensitive information from host stack memory via a "supposedly-ignored" operand size prefix.
2.1 Low
CVSS2
3.3 Low
CVSS3