First published: Tue Dec 12 2017(Updated: )
An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | <=4.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17564 is rated as a high severity vulnerability due to its potential to cause a denial of service and escalate privileges on the host OS.
To fix CVE-2017-17564, update to a patched version of Xen, specifically versions 4.11.4+107-gef32c7afa2-1, 4.14.6-1, or higher.
CVE-2017-17564 affects Xen hypervisor versions up to and including 4.9.1.
Exploitation of CVE-2017-17564 could allow guest OS users to crash the host OS or gain elevated privileges.
There are no reliable workarounds for CVE-2017-17564; updating to a secure version is the recommended approach.