Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-10982

Опубликовано: 10 мая 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 7.2
CVSS3: 8.8

Описание

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.

РелизСтатусПримечание
artful

ignored

end of life
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/focal

not-affected

4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
esm-apps/jammy

not-affected

4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
esm-apps/noble

not-affected

4.8.3+xsa262+shim4.10.0+comet3-1+deb9u6
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needs-triage]

Показывать по

EPSS

Процентиль: 21%
0.00069
Низкий

7.2 High

CVSS2

8.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
redhat
больше 7 лет назад

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.

CVSS3: 8.8
nvd
больше 7 лет назад

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.

CVSS3: 8.8
debian
больше 7 лет назад

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest O ...

CVSS3: 8.8
github
больше 3 лет назад

An issue was discovered in Xen through 4.10.x allowing x86 HVM guest OS users to cause a denial of service (unexpectedly high interrupt number, array overrun, and hypervisor crash) or possibly gain hypervisor privileges by setting up an HPET timer to deliver interrupts in IO-APIC mode, aka vHPET interrupt injection.

suse-cvrf
больше 7 лет назад

Security update for xen

EPSS

Процентиль: 21%
0.00069
Низкий

7.2 High

CVSS2

8.8 High

CVSS3