Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2018-15470

Опубликовано: 17 авг. 2018
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.9
CVSS3: 6.5

Описание

An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
cosmic

ignored

end of life
devel

not-affected

4.11.1~pre.20180911.5acdd26fdc+dfsg-2
disco

ignored

end of life
eoan

ignored

end of life
esm-apps/focal

not-affected

4.11.1~pre.20180911.5acdd26fdc+dfsg-2
esm-apps/jammy

not-affected

4.11.1~pre.20180911.5acdd26fdc+dfsg-2
esm-apps/noble

not-affected

4.11.1~pre.20180911.5acdd26fdc+dfsg-2
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needs-triage]
esm-infra/bionic

needed

Показывать по

EPSS

Процентиль: 40%
0.00182
Низкий

4.9 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6
redhat
больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.

CVSS3: 6.5
nvd
больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.

CVSS3: 6.5
debian
больше 7 лет назад

An issue was discovered in Xen through 4.11.x. The logic in oxenstored ...

CVSS3: 6.5
github
больше 3 лет назад

An issue was discovered in Xen through 4.11.x. The logic in oxenstored for handling writes depended on the order of evaluation of expressions making up a tuple. As indicated in section 7.7.3 "Operations on data structures" of the OCaml manual, the order of evaluation of subexpressions is not specified. In practice, different implementations behave differently. Thus, oxenstored may not enforce the configured quota-maxentity. This allows a malicious or buggy guest to write as many xenstore entries as it wishes, causing unbounded memory usage in oxenstored. This can lead to a system-wide DoS.

suse-cvrf
больше 7 лет назад

Security update for xen

EPSS

Процентиль: 40%
0.00182
Низкий

4.9 Medium

CVSS2

6.5 Medium

CVSS3