CVE-2019-17347Improper Input Validation in Linux

Severity
7.8HIGHNVD
EPSS
0.1%
top 78.78%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedOct 8
Latest updateMay 24

Description

An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges because a guest can manipulate its virtualised %cr4 in a way that is incompatible with Linux (and possibly other guest kernels).

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages3 packages

debiandebian/xen< xen 4.11.1+92-g6c33308a8d-1 (bookworm)
Debianxen/xen< 4.11.1+92-g6c33308a8d-1+3
NVDxen/xen4.1.04.11.2

Also affects: Debian Linux 10.0, 9.0

Patches

🔴Vulnerability Details

2
GHSA
GHSA-34w6-68wc-gx7h: An issue was discovered in Xen through 42022-05-24
OSV
CVE-2019-17347: An issue was discovered in Xen through 42019-10-08

📋Vendor Advisories

2
Red Hat
xen: x86: PV kernel context switch corruption leading to Dos or privileges escalation2019-10-31
Debian
CVE-2019-17347: xen - An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to ...2019

💬Community

2
Bugzilla
CVE-2019-17347 xen: x86: PV kernel context switch corruption leading to Dos or privileges escalation2019-11-12
Bugzilla
CVE-2019-17347 xen: x86: PV kernel context switch corruption leading to Dos or privileges escalation [fedora-all]2019-11-12