Описание
In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Ссылки
- Patch
- Patch
- PatchVendor Advisory
- Patch
- Patch
- PatchVendor Advisory
Уязвимые конфигурации
EPSS
6.7 Medium
CVSS3
Дефекты
Связанные уязвимости
In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
In multiple functions of mem_protect.c, there is a possible way to acc ...
In multiple functions of mem_protect.c, there is a possible way to access hypervisor memory due to a memory access check in the wrong place. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.
Уязвимость функции __check_page_state_visitor() в модуле arch/arm64/kvm/hyp/nvhe/mem_protect.c подсистемы виртуализации KVM ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
EPSS
6.7 Medium
CVSS3