Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-27674

Опубликовано: 22 окт. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6
CVSS3: 5.3

Описание

An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

4.11.4+57-g41a822c392-1
esm-apps/focal

needed

esm-apps/jammy

not-affected

4.11.4+57-g41a822c392-1
esm-apps/noble

not-affected

4.11.4+57-g41a822c392-1
esm-infra-legacy/trusty

DNE

esm-infra/bionic

needed

esm-infra/xenial

needed

focal

ignored

end of standard support, was needed
groovy

ignored

end of life

Показывать по

EPSS

Процентиль: 22%
0.00073
Низкий

4.6 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.3
redhat
больше 5 лет назад

An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.

CVSS3: 5.3
nvd
больше 5 лет назад

An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.

CVSS3: 5.3
debian
больше 5 лет назад

An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS ...

CVSS3: 5.3
github
больше 3 лет назад

An issue was discovered in Xen through 4.14.x allowing x86 PV guest OS users to gain guest OS privileges by modifying kernel memory contents, because invalidation of TLB entries is mishandled during use of an INVLPG-like attack technique.

suse-cvrf
около 5 лет назад

Security update for xen

EPSS

Процентиль: 22%
0.00073
Низкий

4.6 Medium

CVSS2

5.3 Medium

CVSS3