Описание
An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
| Релиз | Статус | Примечание |
|---|---|---|
| artful | ignored | end of life |
| bionic | released | 4.9.2-0ubuntu1 |
| cosmic | not-affected | 4.9.2-0ubuntu1 |
| devel | not-affected | 4.9.2-0ubuntu1 |
| disco | not-affected | 4.9.2-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was needs-triage] |
| esm-infra/bionic | released | 4.9.2-0ubuntu1 |
| esm-infra/xenial | released | 4.6.4-0ubuntu1.4 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
Показывать по
EPSS
4.9 Medium
CVSS2
6 Medium
CVSS3
Связанные уязвимости
An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest ...
An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
EPSS
4.9 Medium
CVSS2
6 Medium
CVSS3