Out-of-Bounds The advisory has been revoked - it doesn't affect any version of package xen  (opens in a new tab)


Threat Intelligence

EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU1810-XEN-658867
  • published30 Oct 2017
  • disclosed30 Oct 2017

Introduced: 30 Oct 2017

CVE-2017-15597  (opens in a new tab)
CWE-119  (opens in a new tab)
CWE-200  (opens in a new tab)

Amendment

The Ubuntu security team deemed this advisory irrelevant for Ubuntu:18.10.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen package and not the xen package as distributed by Ubuntu.

An issue was discovered in Xen through 4.9.x. Grant copying code made an implication that any grant pin would be accompanied by a suitable page reference. Other portions of code, however, did not match up with that assumption. When such a grant copy operation is being done on a grant of a dying domain, the assumption turns out wrong. A malicious guest administrator can cause hypervisor memory corruption, most likely resulting in host crash and a Denial of Service. Privilege escalation and information leaks cannot be ruled out.