Описание
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.5.1-0ubuntu2 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.3]] |
| precise | released | 4.1.6.1-0ubuntu0.12.04.7 |
| trusty | released | 4.4.2-0ubuntu0.14.04.3 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.3] |
| upstream | needs-triage | |
| vivid | released | 4.5.0-1ubuntu4.3 |
| wily | released | 4.5.1-0ubuntu1.1 |
Показывать по
EPSS
7.2 High
CVSS2
Связанные уязвимости
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x do ...
The mod_l2_entry function in arch/x86/mm.c in Xen 3.4 through 4.6.x does not properly validate level 2 page table entries, which allows local PV guest administrators to gain privileges via a crafted superpage mapping.
EPSS
7.2 High
CVSS2