Описание
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | xen | Will not fix |
Показывать по
10
Дополнительная информация
Статус:
Important
https://bugzilla.redhat.com/show_bug.cgi?id=1406259xen: x86: Mishandling of SYSCALL singlestep during emulation (XSA-204)
EPSS
Процентиль: 27%
0.00099
Низкий
7.4 High
CVSS3
6.2 Medium
CVSS2
Связанные уязвимости
CVSS3: 7.8
ubuntu
около 9 лет назад
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
CVSS3: 7.8
nvd
около 9 лет назад
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
CVSS3: 7.8
debian
около 9 лет назад
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain p ...
CVSS3: 7.8
github
больше 3 лет назад
Xen through 4.8.x allows local 64-bit x86 HVM guest OS users to gain privileges by leveraging mishandling of SYSCALL singlestep during emulation.
EPSS
Процентиль: 27%
0.00099
Низкий
7.4 High
CVSS3
6.2 Medium
CVSS2