First published: Tue Oct 08 2019(Updated: )
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/xen | 4.11.4+107-gef32c7afa2-1 4.14.6-1 4.14.5+94-ge49571868d-1 4.17.2+76-ge1f9cb16e2-1~deb12u1 4.17.2+76-ge1f9cb16e2-1 | |
Xen XAPI | <=4.11.2 | |
Debian Linux | =9.0 | |
Debian Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-17341 has been classified as a high severity vulnerability due to its potential to cause denial of service and privilege escalation.
To fix CVE-2019-17341, update to Xen version 4.11.4+107-gef32c7afa2-1 or later for the affected versions.
CVE-2019-17341 is a race condition vulnerability that affects x86 PV guest OS users in Xen.
CVE-2019-17341 affects Xen versions up to 4.11.2 and includes specific affected versions in the 4.11.x series.
Exploiting CVE-2019-17341 can lead to a denial of service or elevated privileges for x86 PV guest OS users.