CVE-2019-17345Improper Input Validation in XEN

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 77.40%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 8
Latest updateMay 24

Description

An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS users to cause a denial of service because mishandling of failed IOMMU operations causes a bug check during the cleanup of a crashed guest.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:HExploitability: 2.0 | Impact: 4.0

Affected Packages3 packages

debiandebian/xen< xen 4.11.1+92-g6c33308a8d-1 (bookworm)
Debianxen/xen< 4.11.1+92-g6c33308a8d-1+3
NVDxen/xen4.8.04.11.2

Also affects: Debian Linux 10.0, 9.0

🔴Vulnerability Details

2
GHSA
GHSA-ph73-rj9x-9q3g: An issue was discovered in Xen 42022-05-24
OSV
CVE-2019-17345: An issue was discovered in Xen 42019-10-08

📋Vendor Advisories

2
Red Hat
xen: xsa291: x86/PV: page type reference counting issue with failed IOMMU update2019-03-05
Debian
CVE-2019-17345: xen - An issue was discovered in Xen 4.8.x through 4.11.x allowing x86 PV guest OS use...2019

💬Community

1
Bugzilla
CVE-2019-17345 xen: xsa291: x86/PV: page type reference counting issue with failed IOMMU update2019-03-05