Описание
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 4.9.0-0ubuntu1 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.12]] |
| esm-infra/xenial | released | 4.6.5-0ubuntu1.2 |
| precise/esm | DNE | |
| trusty | released | 4.4.2-0ubuntu0.14.04.12 |
| trusty/esm | DNE | trusty was released [4.4.2-0ubuntu0.14.04.12] |
| upstream | needs-triage | |
| vivid/ubuntu-core | DNE | |
| xenial | released | 4.6.5-0ubuntu1.2 |
| yakkety | released | 4.7.2-0ubuntu1.3 |
Показывать по
10 Critical
CVSS2
10 Critical
CVSS3
Связанные уязвимости
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
Xen through 4.8.x does not validate memory allocations during certain ...
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
Уязвимость гипервизора Xen, позволяющая нарушителю получить привилегированный доступ к хосту
10 Critical
CVSS2
10 Critical
CVSS3