First published: Wed Aug 02 2017(Updated: )
ISSUE DESCRIPTION ================= Code to handle copy operations on transitive grants has built in retry logic, involving a function reinvoking itself with unchanged parameters. Such use assumes that the compiler would also translate this to a so called "tail call" when generating machine code. Empirically, this is not commonly the case, allowing for theoretically unbounded nesting of such function calls. IMPACT ====== A malicious or buggy guest may be able to crash Xen. Privilege escalation and information leaks cannot be ruled out. VULNERABLE SYSTEMS ================== All versions of Xen are vulnerable. MITIGATION ========== There is no known mitigation. External References: <a href="http://xenbits.xen.org/xsa/advisory-226.html">http://xenbits.xen.org/xsa/advisory-226.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | ||
XenServer | =6.0.2 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
XenServer | =7.0 | |
XenServer | =7.1 | |
XenServer | =7.2 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12135 is rated high with a score of 8.8.
To fix CVE-2017-12135, apply the latest security patches or upgrades provided by the software vendor.
CVE-2017-12135 affects various versions of Xen, Citrix XenServer, and Debian Linux.
CVE-2017-12135 primarily requires local OS guest access, making remote exploitation unlikely.
The potential impacts of CVE-2017-12135 include denial of service and possible unauthorized privilege escalation.