- Home
- CVEs with nessus.description==According to the versions of the anaconda / anaconda-core /
anaconda-dracut / etc packages installed, the Virtuozzo installation
on the remote host is affected by the following vulnerabilities :
- A flaw was found in the way the Linux kernel's KVM
hypervisor handled exceptions delivered after a stack
switch operation via Mov SS or Pop SS instructions.
During the stack switch operation, the processor did
not deliver interrupts and exceptions, rather they are
delivered once the first instruction after the stack
switch is executed. An unprivileged KVM guest user
could use this flaw to crash the guest or, potentially,
escalate their privileges in the guest.
- An industry-wide issue was found in the way many modern
microprocessor designs have implemented speculative
execution of Load & Store instructions (a commonly used
performance optimization). It relies on the presence of
a precisely-defined instruction sequence in the
privileged code as well as the fact that memory read
from address to which a recent memory write has
occurred may see an older value and subsequently cause
an update into the microprocessor's data cache even for
speculatively executed instructions that never actually
commit (retire). As a result, an unprivileged attacker
could use this flaw to read privileged memory by
conducting targeted cache side-channel attacks. NOTE:
This fix also requires CPU microcode/firmware updates
and subscribers are advised to contact their hardware
OEM vendors to receive the appropriate
microcode/firmware for their processor. A kernel
update, without the appropriate firmware/microcode
updated for the processor, is insufficient to remediate
this vulnerability.
- A flaw was found in the way the Linux kernel handled
exceptions delivered after a stack switch operation via
Mov SS or Pop SS instructions. During the stack switch
operation, the processor did not deliver interrupts and
exceptions, rather they are delivered once the first
instruction after the stack switch is executed. An
unprivileged system user could use this flaw to crash
the system kernel resulting in the denial of service.
Note that Tenable Network Security has extracted the preceding
description block directly from the Virtuozzo security advisory.
Tenable has attempted to automatically clean and format it as much as
possible without introducing additional issues.
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top