Описание
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
Ссылки
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- PatchVendor Advisory
- Third Party AdvisoryVDB Entry
- Third Party AdvisoryVDB Entry
- PatchVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 4.8.0 (включая)
cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*
EPSS
Процентиль: 27%
0.00099
Низкий
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-264
Связанные уязвимости
CVSS3: 7.8
ubuntu
около 9 лет назад
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
CVSS3: 7.4
redhat
около 9 лет назад
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
CVSS3: 7.8
debian
около 9 лет назад
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain p ...
CVSS3: 7.8
github
больше 3 лет назад
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
EPSS
Процентиль: 27%
0.00099
Низкий
7.8 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-264