Описание
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support, was needed |
| devel | not-affected | 4.11.4+57-g41a822c392-1 |
| esm-apps/focal | needed | |
| esm-apps/jammy | not-affected | 4.11.4+57-g41a822c392-1 |
| esm-apps/noble | not-affected | 4.11.4+57-g41a822c392-1 |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | needed | |
| esm-infra/xenial | needed | |
| focal | ignored | end of standard support, was needed |
| groovy | ignored | end of life |
Показывать по
EPSS
4.6 Medium
CVSS2
5.3 Medium
CVSS3
Связанные уязвимости
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS ...
An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.
EPSS
4.6 Medium
CVSS2
5.3 Medium
CVSS3