CVE-2016-9383

Name
CVE-2016-9383
Description
Xen, when running on a 64-bit hypervisor, allows local x86 guest OS users to modify arbitrary memory and consequently obtain sensitive information, cause a denial of service (host crash), or execute arbitrary code on the host by leveraging broken emulation of bit test instructions.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Third Party Advisory http://www.securityfocus.com/bid/94474
Third Party Advisory http://www.securitytracker.com/id/1037346
Patch http://xenbits.xen.org/xsa/advisory-195.html
cve@mitre.org https://security.gentoo.org/glsa/201612-56
Patch https://support.citrix.com/article/CTX218775

Match rules

CPE URI Source package Min version Max version
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:* xen == None == None

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
xen edge-main 4.19.0-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
xen edge-main 4.19.1-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen edge-main 4.19.1-r1 Natanael Copa <ncopa@alpinelinux.org> fixed
xen edge-main 4.19.2-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen edge-main 4.20.0-r0 Natanael Copa <ncopa@alpinelinux.org> fixed
xen edge-main 4.20.0-r1 Natanael Copa <ncopa@alpinelinux.org> fixed