First published: Wed Aug 02 2017(Updated: )
arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen XAPI | ||
XenServer | =6.0.2 | |
XenServer | =6.2.0 | |
XenServer | =6.5 | |
XenServer | =7.0 | |
XenServer | =7.1 | |
XenServer | =7.2 | |
Debian | =8.0 | |
Debian | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12137 has a severity rating that indicates a potential for privilege escalation in local PV guest OS users.
To mitigate CVE-2017-12137, it is recommended to apply the latest patches or updates provided by Xen or Citrix for the affected versions.
CVE-2017-12137 affects various versions of Xen and Citrix XenServer, including specific Debian releases.
CVE-2017-12137 cannot be exploited remotely as it requires local access to a vulnerable PV guest OS.
CVE-2017-12137 impacts XenServer versions 6.0.2, 6.2.0, 6.5, 7.0, 7.1, and 7.2.