Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-2732

Опубликовано: 08 апр. 2020
Источник: debian
EPSS Низкий

Описание

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.5.13-1package

Примечания

  • https://git.kernel.org/linus/07721feee46b4b248402133228235318199b05ec

  • https://git.kernel.org/linus/35a571346a94fb93b5b3b6a599675ef3384bc75c

  • https://git.kernel.org/linus/e71237d3ff1abf9f3388337cfebf53b96df2020d

EPSS

Процентиль: 62%
0.00438
Низкий

Связанные уязвимости

CVSS3: 5.8
ubuntu
около 5 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.

CVSS3: 5.8
redhat
больше 5 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.

CVSS3: 5.8
nvd
около 5 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.

github
около 3 лет назад

A flaw was discovered in the way that the KVM hypervisor handled instruction emulation for an L2 guest when nested virtualisation is enabled. Under some circumstances, an L2 guest may trick the L0 guest into accessing sensitive L1 resources that should be inaccessible to the L2 guest.

oracle-oval
больше 5 лет назад

ELSA-2020-5543: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 62%
0.00438
Низкий