[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

[3.5] xen: Multiple issues (CVE-2016-9386, CVE-2016-9382, CVE-2016-9385, CVE-2016-9384, CVE-2016-9383, CVE-2016-9377, CVE-2016-9378, CVE-2016-9381, CVE-2016-9379, CVE-2016-9380)

ID: oval:org.secpod.oval:def:1800696Date: (C)2018-03-28   (M)2023-12-07
Class: PATCHFamily: unix




CVE-2016-9386, XSA-191: x86 null segments not always treated as unusable Reference CVE-2016-9382, XSA-192: x86 task switch to VM86 mode mis-handled Reference CVE-2016-9385, XSA-193: x86 segment base write emulation lacking canonical address checks Reference CVE-2016-9384, XSA-194: guest 32-bit ELF symbol table load leaking host data Reference CVE-2016-9383, XSA-195: x86 64-bit bit test instruction emulation broken Reference CVE-2016-9377, CVE-2016-9378, XSA-196: x86 software interrupt injection mis-handled Reference CVE-2016-9381, XSA-197: qemu incautious about shared ring processing Reference: CVE-2016-9379, CVE-2016-9380, XSA-198: delimiter injection vulnerabilities in pygrub Reference

Platform:
Alpine Linux 3.5
Product:
xen
Reference:
6495
CVE-2016-9386
CVE-2016-9382
CVE-2016-9385
CVE-2016-9384
CVE-2016-9383
CVE-2016-9377
CVE-2016-9378
CVE-2016-9381
CVE-2016-9379
CVE-2016-9380
CVE    10
CVE-2016-9386
CVE-2016-9385
CVE-2016-9384
CVE-2016-9383
...
CPE    2
cpe:/o:alpinelinux:alpine_linux:3.5
cpe:/a:xen:xen

© SecPod Technologies