Out-of-Bounds Affecting xen package, versions <4.7.0-r1
Threat Intelligence
EPSS
0.07% (32nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-ALPINE320-XEN-7012670
- published 23 May 2024
- disclosed 21 Sep 2016
Introduced: 21 Sep 2016
CVE-2016-7094 Open this link in a new tabHow to fix?
Upgrade Alpine:3.20
xen
to version 4.7.0-r1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream xen
package and not the xen
package as distributed by Alpine
.
See How to fix?
for Alpine:3.20
relevant fixed versions and status.
Buffer overflow in Xen 4.7.x and earlier allows local x86 HVM guest OS administrators on guests running with shadow paging to cause a denial of service via a pagetable update.
References
- http://www.securityfocus.com/bid/92864
- http://support.citrix.com/article/CTX216071
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://xenbits.xen.org/xsa/advisory-187.html
- http://xenbits.xen.org/xsa/xsa187-0001-x86-shadow-Avoid-overflowing-sh_ctxt-seg_reg.patch
- http://www.debian.org/security/2016/dsa-3663
- https://security.gentoo.org/glsa/201611-09
- http://www.securitytracker.com/id/1036753