Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jmgg-m7r5-7296

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.

The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.

EPSS

Процентиль: 30%
0.0011
Низкий

Дефекты

CWE-200

Связанные уязвимости

ubuntu
больше 12 лет назад

The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.

redhat
больше 12 лет назад

The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.

nvd
больше 12 лет назад

The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use the correct variable for the source effective address, which allows local HVM guests to obtain hypervisor stack information by reading the values used by the instruction.

debian
больше 12 лет назад

The fbld instruction emulation in Xen 3.3.x through 4.3.x does not use ...

EPSS

Процентиль: 30%
0.0011
Низкий

Дефекты

CWE-200