vulnerability
FreeBSD: xen-kernel -- VMX: guest user mode may crash guest with non-canonical RIP (CVE-2016-2271)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:N/C:N/I:N/A:P) | Feb 19, 2016 | Feb 29, 2016 | Oct 30, 2017 |
Severity
2
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:P)
Published
Feb 19, 2016
Added
Feb 29, 2016
Modified
Oct 30, 2017
Description
VMX in Xen 4.6.x and earlier, when using an Intel or Cyrix CPU, allows local HVM guest users to cause a denial of service (guest crash) via vectors related to a non-canonical RIP.
Solution
freebsd-upgrade-package-xen-kernel
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.