Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mrv5-xm7c-h532

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 8.4

Описание

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

EPSS

Процентиль: 66%
0.00516
Низкий

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 8.4
ubuntu
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

redhat
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

CVSS3: 8.4
nvd
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6.x and earlier does not properly handle the Page Size (PS) page table entry bit at the L4 and L3 page table levels, which might allow local guest OS users to gain privileges via a crafted mapping of memory.

CVSS3: 8.4
debian
больше 9 лет назад

The guest_walk_tables function in arch/x86/mm/guest_walk.c in Xen 4.6. ...

suse-cvrf
больше 9 лет назад

Security update for xen

EPSS

Процентиль: 66%
0.00516
Низкий

8.4 High

CVSS3