First published: Thu May 11 2017(Updated: )
Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | =4.6.0 | |
Xen xen-unstable | =4.6.1 | |
Xen xen-unstable | =4.6.2 | |
Xen xen-unstable | =4.6.3 | |
Xen xen-unstable | =4.6.4 | |
Xen xen-unstable | =4.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-8905 has been assigned a high severity rating due to its potential to allow arbitrary code execution on the host OS.
To fix CVE-2017-8905, you should upgrade to Xen versions 4.6.6 or later, where the vulnerability has been addressed.
CVE-2017-8905 affects Xen through versions 4.6.x on 64-bit platforms.
CVE-2017-8905 can allow PV guest OS users to execute arbitrary code on the host OS, leading to potential system compromise.
CVE-2017-8905 is specifically related to the Xen hypervisor's mishandling of a failsafe callback within the paravirtualized (PV) architecture.