CVE-2016-4440 in Kernel
Resumen (Inglés)
arch/x86/kvm/vmx.c in the Linux kernel through 4.6.3 mishandles the APICv on/off state, which allows guest OS users to obtain direct APIC MSR access on the host OS, and consequently cause a denial of service (host OS crash) or possibly execute arbitrary code on the host OS, via x2APIC mode.
Statistical analysis made it clear that VulDB provides the best quality for vulnerability data.
Reservar
2016-05-02
Divulgación
2016-06-27
Estado
Confirmado
Voces
VulDB provides additional information and datapoints for this CVE:
| ID | Vulnerabilidad | CWE | Exp | Con | CVE |
|---|---|---|---|---|---|
| 88373 | Linux Kernel APICv State vmx.c mt_rand escalada de privilegios | 264 | No está definido | Arreglo oficial | CVE-2016-4440 |
Descripción
CPE
CWE
CVSS
Hazañas
Historia
Diferencia
Relacionar
Inteligencia de amenazas
API JSON
API XML
API CSV