Xen 4.9.x allows guest OS users to cause denial of service or gain host OS privileges by leveraging incorrect mask for reference-count overflow checking in shadow mode
Reporter | Title | Published | Views | Family All 72 |
---|---|---|---|---|
![]() | CVE-2017-17563 | 12 Dec 201700:00 | – | ubuntucve |
![]() | Code injection | 12 Dec 201723:29 | – | prion |
![]() | broken x86 shadow mode refcount overflow check | 12 Dec 201711:35 | – | xen |
![]() | CVE-2017-17563 | 12 Dec 201722:00 | – | cvelist |
![]() | CVE-2017-17563 | 12 Dec 201723:29 | – | debiancve |
![]() | Xen Function Page Use Shadow Mode Reference Counting Improper Overflow Check Guest-to-Host DoS (XSA-249) | 29 Dec 201700:00 | – | nessus |
![]() | OracleVM 3.4 : xen (OVMSA-2018-0039) | 3 May 201800:00 | – | nessus |
![]() | Debian DSA-4112-1 : xen - security update | 15 Feb 201800:00 | – | nessus |
![]() | OracleVM 3.2 : xen (OVMSA-2018-0225) | 4 Jun 201800:00 | – | nessus |
![]() | Fedora 27 : xen (2017-5945560816) | 15 Jan 201800:00 | – | nessus |
Source | Link |
---|---|
xenbits | www.xenbits.xen.org/xsa/advisory-249.html |
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo