Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-10918

Опубликовано: 20 июн. 2017
Источник: redhat
CVSS3: 8.5
EPSS Низкий

Описание

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

Меры по смягчению последствий

On x86, specifying "hap_1gb=0 hap_2mb=0" on the hypervisor command line will avoid the vulnerability. Alternatively, running all x86 HVM guests in shadow mode will also avoid this vulnerability. (For example, by specifying "hap=0" in the xl domain configuration file.) There is no known mitigation on ARM systems.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenWill not fix

Показывать по

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=1458876xen: stale P2M mappings due to insufficient error checking (XSA-222)

EPSS

Процентиль: 82%
0.01672
Низкий

8.5 High

CVSS3

Связанные уязвимости

CVSS3: 10
ubuntu
больше 8 лет назад

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

CVSS3: 10
nvd
больше 8 лет назад

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

CVSS3: 10
debian
больше 8 лет назад

Xen through 4.8.x does not validate memory allocations during certain ...

CVSS3: 10
github
больше 3 лет назад

Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.

fstec
больше 8 лет назад

Уязвимость гипервизора Xen, позволяющая нарушителю получить привилегированный доступ к хосту

EPSS

Процентиль: 82%
0.01672
Низкий

8.5 High

CVSS3