CVE-2017-17565Improper Input Validation in XEN

Severity
5.6MEDIUMNVD
EPSS
0.1%
top 79.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedDec 12
Latest updateMay 14

Description

An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause a denial of service (host OS crash) if shadow mode and log-dirty mode are in place, because of an incorrect assertion related to M2P.

CVSS vector

CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 1.1 | Impact: 4.0

Affected Packages3 packages

debiandebian/xen< xen 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5 (bookworm)
Debianxen/xen< 4.8.3+comet2+shim4.10.0+comet3-1+deb9u5+3
NVDxen/xen4.9.1

Patches

🔴Vulnerability Details

2
GHSA
GHSA-rv23-xwvf-5q5q: An issue was discovered in Xen through 42022-05-14
OSV
CVE-2017-17565: An issue was discovered in Xen through 42017-12-12

📋Vendor Advisories

2
Red Hat
xen: improper bug check in x86 log-dirty handling (XSA-251)2017-12-12
Debian
CVE-2017-17565: xen - An issue was discovered in Xen through 4.9.x allowing PV guest OS users to cause...2017

💬Community

2
Bugzilla
CVE-2017-17563 CVE-2017-17564 CVE-2017-17565 CVE-2017-17566 xen: various flaws [fedora-all]2017-12-12
Bugzilla
CVE-2017-17565 xsa251 xen: improper bug check in x86 log-dirty handling (XSA-251)2017-11-29