First published: Tue Dec 12 2017(Updated: )
An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) or gain host OS privileges in shadow mode by mapping a certain auxiliary page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.1+2-gb773c48e36-1 4.17.2+55-g0b56bed864-1 | |
Xen xen-unstable | <=4.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17566 is classified as a critical vulnerability due to its potential to allow denial of service or privilege escalation.
To fix CVE-2017-17566, update to a Xen version that is 4.11.4+107-gef32c7afa2-1 or higher, or any patched version post-4.9.x.
CVE-2017-17566 can lead to a crash of the host OS or allow unauthorized privilege escalations for PV guest OS users.
Xen versions up to 4.9.x, including all versions prior to 4.11.4 and certain other versions, are affected by CVE-2017-17566.
Yes, CVE-2017-17566 has been documented with potential exploit patterns that leverage the vulnerability to compromise the host OS.