Логотип exploitDog
bind:"BDU:2022-04189" OR bind:"CVE-2022-26362"
Консоль
Логотип exploitDog

exploitDog

bind:"BDU:2022-04189" OR bind:"CVE-2022-26362"

Количество 18

Количество 18

fstec логотип

BDU:2022-04189

больше 3 лет назад

Уязвимость гипервизора Xen, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.7
EPSS: Низкий
ubuntu логотип

CVE-2022-26362

больше 3 лет назад

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

CVSS3: 6.4
EPSS: Низкий
nvd логотип

CVE-2022-26362

больше 3 лет назад

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

CVSS3: 6.4
EPSS: Низкий
debian логотип

CVE-2022-26362

больше 3 лет назад

x86 pv: Race condition in typeref acquisition Xen maintains a type ref ...

CVSS3: 6.4
EPSS: Низкий
github логотип

GHSA-2mfj-vmvj-q937

больше 3 лет назад

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

CVSS3: 6.4
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2296-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2164-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2084-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2065-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2158-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2601-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2600-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2599-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2597-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2591-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2574-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2569-1

больше 3 лет назад

Security update for xen

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2022:2560-1

больше 3 лет назад

Security update for xen

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
fstec логотип
BDU:2022-04189

Уязвимость гипервизора Xen, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю выполнить произвольный код

CVSS3: 6.7
0%
Низкий
больше 3 лет назад
ubuntu логотип
CVE-2022-26362

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

CVSS3: 6.4
0%
Низкий
больше 3 лет назад
nvd логотип
CVE-2022-26362

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

CVSS3: 6.4
0%
Низкий
больше 3 лет назад
debian логотип
CVE-2022-26362

x86 pv: Race condition in typeref acquisition Xen maintains a type ref ...

CVSS3: 6.4
0%
Низкий
больше 3 лет назад
github логотип
GHSA-2mfj-vmvj-q937

x86 pv: Race condition in typeref acquisition Xen maintains a type reference count for pages, in addition to a regular reference count. This scheme is used to maintain invariants required for Xen's safety, e.g. PV guests may not have direct writeable access to pagetables; updates need auditing by Xen. Unfortunately, the logic for acquiring a type reference has a race condition, whereby a safely TLB flush is issued too early and creates a window where the guest can re-establish the read/write mapping before writeability is prohibited.

CVSS3: 6.4
0%
Низкий
больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2296-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2164-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2084-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2065-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2158-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2601-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2600-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2599-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2597-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2591-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2574-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2569-1

Security update for xen

больше 3 лет назад
suse-cvrf логотип
SUSE-SU-2022:2560-1

Security update for xen

больше 3 лет назад

Уязвимостей на страницу