First published: Wed Jul 05 2017(Updated: )
Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10918 is rated as high severity due to the potential for guest OS users to gain privileged host OS access.
To fix CVE-2017-10918, users should upgrade to Xen version 4.8.2 or later, where the memory allocation validation issue has been resolved.
CVE-2017-10918 affects users running Xen versions up to and including 4.8.1.
CVE-2017-10918 is a privilege escalation vulnerability caused by improper validation of memory allocations in certain P2M operations.
The potential consequences of CVE-2017-10918 include unauthorized access to the host OS by a compromised guest OS.