Описание
The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a system call.
Ссылки
- Vendor Advisory
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одновременно
Одно из
cpe:2.3:o:freebsd:freebsd:6.3:*:*:*:*:*:*:*
cpe:2.3:o:freebsd:freebsd:7.0:*:*:*:*:*:*:*
cpe:2.3:h:amd:amd64:*:*:*:*:*:*:*:*
EPSS
Процентиль: 14%
0.00045
Низкий
7.2 High
CVSS2
Дефекты
CWE-264
Связанные уязвимости
debian
больше 17 лет назад
The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an e ...
github
почти 4 года назад
The kernel in FreeBSD 6.3 through 7.0 on amd64 platforms can make an extra swapgs call after a General Protection Fault (GPF), which allows local users to gain privileges by triggering a GPF during the kernel's return from (1) an interrupt, (2) a trap, or (3) a system call.
EPSS
Процентиль: 14%
0.00045
Низкий
7.2 High
CVSS2
Дефекты
CWE-264