UBUNTU-CVE-2016-7093

Source
https://ubuntu.com/security/CVE-2016-7093
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2016/UBUNTU-CVE-2016-7093.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2016-7093
Related
Published
2016-09-21T14:25:00Z
Modified
2016-09-21T14:25:00Z
Severity
  • 8.2 (High) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Xen 4.5.3, 4.6.3, and 4.7.x allow local HVM guest OS administrators to overwrite hypervisor memory and consequently gain host OS privileges by leveraging mishandling of instruction pointer truncation during emulation.

References

Affected packages

Ubuntu:16.04:LTS / xen

Package

Name
xen
Purl
pkg:deb/ubuntu/xen?arch=src?distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.6.0-1ubuntu4.1

Affected versions

4.*

4.5.1-0ubuntu1
4.5.1-0ubuntu2
4.6.0-1ubuntu1
4.6.0-1ubuntu2
4.6.0-1ubuntu4

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "libxen-4.6"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "libxen-4.6-dbgsym"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "libxen-dev"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "libxenstore3.0"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "libxenstore3.0-dbgsym"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.4-amd64"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.4-arm64"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.4-armhf"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.5-amd64"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.5-arm64"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.5-armhf"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.6-amd64"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.6-arm64"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-hypervisor-4.6-armhf"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-system-amd64"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-system-arm64"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-system-armhf"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-utils-4.6"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-utils-4.6-dbgsym"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xen-utils-common"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xenstore-utils"
        },
        {
            "binary_version": "4.6.0-1ubuntu4.1",
            "binary_name": "xenstore-utils-dbgsym"
        }
    ]
}