First published: Tue Dec 12 2017(Updated: )
An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | <=4.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17565 has a severity rating of medium due to its potential to cause denial of service affecting the host OS.
To fix CVE-2017-17565, upgrade to Xen versions 4.11.4+107-gef32c7afa2-1, 4.14.6-1, 4.14.5+94-ge49571868d-1, 4.17.1+2-gb773c48e36-1, or 4.17.2+55-g0b56bed864-1.
CVE-2017-17565 is caused by an incorrect assertion related to M2P when shadow mode and log-dirty mode are enabled in Xen.
Xen versions up to and including 4.9.x are affected by CVE-2017-17565, particularly those with shadow mode and log-dirty mode enabled.
The impact of CVE-2017-17565 is a denial of service where a PV guest OS can lead to a crash of the host operating system.