Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-10918

Опубликовано: 05 июл. 2017
Источник: debian
EPSS Низкий

Описание

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.8.1-1+deb9u3package

Примечания

  • https://xenbits.xen.org/xsa/advisory-222.html

EPSS

Процентиль: 82%
0.01672
Низкий

Связанные уязвимости

CVSS3: 10
ubuntu
больше 8 лет назад

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

CVSS3: 8.5
redhat
больше 8 лет назад

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

CVSS3: 10
nvd
больше 8 лет назад

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

CVSS3: 10
github
больше 3 лет назад

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

fstec
больше 8 лет назад

Уязвимость гипервизора Xen, позволяющая нарушителю получить привилегированный доступ к хосту

EPSS

Процентиль: 82%
0.01672
Низкий