Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-10923

Опубликовано: 20 июн. 2017
Источник: redhat
CVSS3: 7.7

Описание

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

Меры по смягчению последствий

On systems where the guest kernel is controlled by the host rather than guest administrator, running only kernels which only send sane IPIs (i.e. targeting valid CPUs) will prevent untrusted guest users from exploiting this issue. However untrusted guest administrators can still trigger it unless further steps are taken to prevent them from loading code into the kernel (e.g by disabling loadable modules etc) or from using other mechanisms which allow them to run code at kernel privilege.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5xenNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1459515xen: arm: vgic: Out-of-bound access when sending SGIs (XSA-225)

7.7 High

CVSS3

Связанные уязвимости

CVSS3: 6.5
ubuntu
больше 8 лет назад

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

CVSS3: 6.5
nvd
больше 8 лет назад

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

CVSS3: 6.5
debian
больше 8 лет назад

Xen through 4.8.x does not validate a vCPU array index upon the sendin ...

CVSS3: 6.5
github
больше 3 лет назад

Xen through 4.8.x does not validate a vCPU array index upon the sending of an SGI, which allows guest OS users to cause a denial of service (hypervisor crash), aka XSA-225.

7.7 High

CVSS3