Описание
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
A vulnerability was found Xen's MMU emulation for x86 PV guests. A malicious administrator of an x86 PV guest could control some of the page table bits, allowing potential control of memory and code execution in the host. x86 HVM and ARM guests could not exploit this flaw.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 5 | xen | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
8.5 High
CVSS3
6 Medium
CVSS2
Связанные уязвимости
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows ...
The PV pagetable code in arch/x86/mm.c in Xen 4.7.x and earlier allows local 32-bit PV guest OS administrators to gain host OS privileges by leveraging fast-paths for updating pagetable entries.
EPSS
8.5 High
CVSS3
6 Medium
CVSS2