CVE-2017-15597

Priority
Description
An issue was discovered in Xen through 4.9.x. Grant copying code made an
implication that any grant pin would be accompanied by a suitable page
reference. Other portions of code, however, did not match up with that
assumption. When such a grant copy operation is being done on a grant of a
dying domain, the assumption turns out wrong. A malicious guest
administrator can cause hypervisor memory corruption, most likely resulting
in host crash and a Denial of Service. Privilege escalation and information
leaks cannot be ruled out.
Notes
 mdeslaur> hypervisor packages are in universe. For
 mdeslaur> issues in the hypervisor, add appropriate
 mdeslaur> tags to each section, ex:
 mdeslaur> Tags_xen: universe-binary
Package
Source: xen (LP Ubuntu Debian)
Upstream:released (4.9.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):released (4.9.2-0ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (4.9.2-0ubuntu1)
Ubuntu 19.10 (Eoan):not-affected (4.9.2-0ubuntu1)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-09-19 14:37:37 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)