An issue was discovered in Xen through 4.9.x. Grant copying code made an
implication that any grant pin would be accompanied by a suitable page
reference. Other portions of code, however, did not match up with that
assumption. When such a grant copy operation is being done on a grant of a
dying domain, the assumption turns out wrong. A malicious guest
administrator can cause hypervisor memory corruption, most likely resulting
in host crash and a Denial of Service. Privilege escalation and information
leaks cannot be ruled out.
mdeslaurhypervisor packages are in universe. For
issues in the hypervisor, add appropriate
tags to each section, ex:
Tags_xen: universe-binary
Source: xen (LP Ubuntu Debian)
Upstream:released (4.9.1)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):released (4.9.2-0ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (4.9.2-0ubuntu1)
Ubuntu 19.10 (Eoan Ermine):not-affected (4.9.2-0ubuntu1)
Ubuntu 20.04 (Focal Fossa):not-affected (4.9.2-0ubuntu1)
Binaries built from this source package are in universe and so are supported by the community. For more details see
More Information

Updated: 2019-12-05 19:46:00 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)