Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5qq2-9j69-8qqc

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

EPSS

Процентиль: 40%
0.00183
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 11 лет назад

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

nvd
больше 11 лет назад

Xen 4.4.x does not properly validate the load address for 64-bit ARM guest kernels, which allows local users to read system memory or cause a denial of service (crash) via a crafted kernel, which triggers a buffer overflow.

debian
больше 11 лет назад

Xen 4.4.x does not properly validate the load address for 64-bit ARM g ...

EPSS

Процентиль: 40%
0.00183
Низкий

Дефекты

CWE-20