Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-7835

Опубликовано: 30 окт. 2015
Источник: debian
EPSS Низкий

Описание

The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.6.0-1package
xenend-of-lifesqueezepackage

Примечания

  • http://xenbits.xen.org/xsa/advisory-148.html

EPSS

Процентиль: 32%
0.00122
Низкий

Связанные уязвимости

ubuntu
больше 10 лет назад

The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

redhat
больше 10 лет назад

The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

nvd
больше 10 лет назад

The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

github
больше 3 лет назад

The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.

suse-cvrf
больше 10 лет назад

Security update for xen

EPSS

Процентиль: 32%
0.00122
Низкий