Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-10923

Опубликовано: 05 июл. 2017
Источник: debian
EPSS Низкий

Описание

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.8.1-1+deb9u3package
xenfixed4.8.1-1+deb9u3stretchpackage
xennot-affectedjessiepackage
xennot-affectedwheezypackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-225.html

EPSS

Процентиль: 73%
0.00779
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

CVSS3: 7.7
redhat
больше 8 лет назад

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

CVSS3: 6.5
nvd
больше 8 лет назад

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

CVSS3: 6.5
github
больше 3 лет назад

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

EPSS

Процентиль: 73%
0.00779
Низкий