Описание
The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.8.0-1ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.9]] |
| esm-infra/xenial | released | 4.6.0-1ubuntu4.3 |
| precise | released | 4.1.6.1-0ubuntu0.12.04.13 |
| precise/esm | DNE | precise was released [4.1.6.1-0ubuntu0.12.04.13] |
| trusty | released | 4.4.2-0ubuntu0.14.04.9 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.9] |
| upstream | needed | |
| vivid/stable-phone-overlay | DNE | |
| vivid/ubuntu-core | DNE |
Показывать по
EPSS
4.6 Medium
CVSS2
7.8 High
CVSS3
Связанные уязвимости
The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
The x86 emulator in Xen does not properly treat x86 NULL segments as u ...
The x86 emulator in Xen does not properly treat x86 NULL segments as unusable when accessing memory, which might allow local HVM guest users to gain privileges via vectors involving "unexpected" base/limit values.
EPSS
4.6 Medium
CVSS2
7.8 High
CVSS3