Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2017-7228

Опубликовано: 04 апр. 2017
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2
CVSS3: 8.2

Описание

An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.

РелизСтатусПримечание
devel

released

4.9.0-0ubuntu2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was released [4.4.2-0ubuntu0.14.04.11]]
esm-infra/xenial

released

4.6.5-0ubuntu1.1
precise

ignored

end of life
precise/esm

DNE

precise was needs-triage
trusty

released

4.4.2-0ubuntu0.14.04.11
trusty/esm

DNE

trusty was released [4.4.2-0ubuntu0.14.04.11]
upstream

needs-triage

vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

Показывать по

EPSS

Процентиль: 81%
0.01535
Низкий

7.2 High

CVSS2

8.2 High

CVSS3

Связанные уязвимости

CVSS3: 8
redhat
почти 9 лет назад

An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.

CVSS3: 8.2
nvd
почти 9 лет назад

An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.

CVSS3: 8.2
debian
почти 9 лет назад

An issue (known as XSA-212) was discovered in Xen, with fixes availabl ...

CVSS3: 8.2
github
больше 3 лет назад

An issue (known as XSA-212) was discovered in Xen, with fixes available for 4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an insufficient check on XENMEM_exchange input, allowing the caller to drive hypervisor memory accesses outside of the guest provided input/output arrays.

fstec
почти 9 лет назад

Уязвимость гипервизора Xen, позволяющая нарушителю получить доступ к памяти гипервизора

EPSS

Процентиль: 81%
0.01535
Низкий

7.2 High

CVSS2

8.2 High

CVSS3