[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.4] xen: Multiple issues (CVE-2016-9386, CVE-2016-9382, CVE-2016-9385, CVE-2016-9383, CVE-2016-9377, CVE-2016-9378, CVE-2016-9381, CVE-2016-9379, CVE-2016-9380)

ID: oval:org.secpod.oval:def:1800306Date: (C)2018-03-29   (M)2023-12-07
Class: PATCHFamily: unix




CVE-2016-9386, XSA-191: x86 null segments not always treated as unusable. Reference: CVE-2016-9382, XSA-192: x86 task switch to VM86 mode mis-handled. Reference: CVE-2016-9385, XSA-193: x86 segment base write emulation lacking canonical address checks. Reference: CVE-2016-9383, XSA-195: x86 64-bit bit test instruction emulation broken. Reference: CVE-2016-9377, CVE-2016-9378, XSA-196: x86 software interrupt injection mis-handled. Reference: CVE-2016-9381, XSA-197: qemu incautious about shared ring processing. Reference: CVE-2016-9379, CVE-2016-9380, XSA-198: delimiter injection vulnerabilities in pygrub. Reference:

Platform:
Alpine Linux 3.4
Product:
xen
Reference:
6496
CVE-2016-9386
CVE-2016-9382
CVE-2016-9385
CVE-2016-9383
CVE-2016-9377
CVE-2016-9378
CVE-2016-9381
CVE-2016-9379
CVE-2016-9380
CVE-2016-9384
CVE    10
CVE-2016-9386
CVE-2016-9385
CVE-2016-9384
CVE-2016-9383
...
CPE    2
cpe:/o:alpinelinux:alpine_linux:3.4
cpe:/a:xen:xen

© SecPod Technologies