CVE-2016-9381

Priority
Medium
Description
Race condition in QEMU in Xen allows local x86 HVM guest OS administrators
to gain privileges by changing certain data on shared rings, aka a "double
fetch" vulnerability.
References
Notes
 mdeslaur> This is XSA-197
Package
Source: xen (LP Ubuntu Debian)
Upstream:needed
Ubuntu 17.10 (Artful Aardvark):not-affected
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was released [4.1.6.1-0ubuntu0.12.04.13])
Ubuntu 14.04 LTS (Trusty Tahr):released (4.4.2-0ubuntu0.14.04.9)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):not-affected
Ubuntu 17.04 (Zesty Zapus):not-affected
Package
Upstream:needed
Ubuntu 17.10 (Artful Aardvark):DNE
Ubuntu 12.04 ESM (Precise Pangolin):needed
Ubuntu 14.04 LTS (Trusty Tahr):DNE
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Ubuntu 17.04 (Zesty Zapus):DNE
Package
Source: qemu (LP Ubuntu Debian)
Upstream:needed
Ubuntu 17.10 (Artful Aardvark):not-affected (1:2.8+dfsg-3ubuntu2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 LTS (Trusty Tahr):released (2.0.0+dfsg-2ubuntu1.33)
Ubuntu Core 15.04:DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (1:2.5+dfsg-5ubuntu10.11)
Ubuntu 17.04 (Zesty Zapus):not-affected (1:2.8+dfsg-3ubuntu2)
Patches:
Upstream:http://git.qemu-project.org/?p=qemu.git;a=commit;h=b85f9dfdb156ae2a2a52f39a36e9f1f270614cd2
More Information

Updated: 2017-08-11 23:23:33 UTC (commit 13081)