Описание
Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.9.0-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.12]] |
| esm-infra/xenial | released | 4.6.5-0ubuntu1.2 |
| precise/esm | DNE | |
| trusty | released | 4.4.2-0ubuntu0.14.04.12 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.12] |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 4.6.5-0ubuntu1.2 |
| yakkety | released | 4.7.2-0ubuntu1.3 |
Показывать по
9.4 Critical
CVSS2
9.1 Critical
CVSS3
Связанные уязвимости
Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
Xen through 4.8.x does not validate the port numbers of polled event c ...
Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
Уязвимость гипервизора Xen, позволяющая нарушителю получить конфиденциальную информацию или вызвать отказ в обслуживании
9.4 Critical
CVSS2
9.1 Critical
CVSS3