Описание
Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.
Ссылки
- Vendor Advisory
- MitigationPatchVendor Advisory
- Vendor Advisory
- MitigationPatchVendor Advisory
Уязвимые конфигурации
Одно из
EPSS
8.8 High
CVSS3
7.2 High
CVSS2
Дефекты
Связанные уязвимости
Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.
Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.
Xen through 4.8.x on 64-bit platforms mishandles page tables after an ...
Xen through 4.8.x on 64-bit platforms mishandles page tables after an IRET hypercall, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-213.
Уязвимость гипервизора Xen, позволяющая нарушителю выполнить произвольный код
EPSS
8.8 High
CVSS3
7.2 High
CVSS2