Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-10919

Опубликовано: 20 июн. 2017
Источник: redhat
CVSS3: 7.7

Описание

Xen through 4.8.x mishandles virtual interrupt injection, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-223.

Меры по смягчению последствий

On systems where the guest kernel is controlled by the host rather than guest administrator, running only kernels which do not disable SGI and PPI (i.e IRQ < 32) will prevent untrusted guest users from exploiting this issue. However untrusted guest administrators can still trigger it unless further steps are taken to prevent them from loading code into the kernel (e.g by disabling loadable modules etc) or from using other mechanisms which allow them to run code at kernel privilege.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1458877xen: ARM guest disabling interrupt may crash Xen (XSA-223)

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

Xen through 4.8.x mishandles virtual interrupt injection, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-223.

CVSS3: 6.5
nvd
больше 8 лет назад

Xen through 4.8.x mishandles virtual interrupt injection, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-223.

CVSS3: 6.5
debian
больше 8 лет назад

Xen through 4.8.x mishandles virtual interrupt injection, which allows ...

CVSS3: 6.5
github
больше 3 лет назад

Xen through 4.8.x mishandles virtual interrupt injection, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-223.

7.7 High

CVSS3