CVE-2017-17563

Priority
Description
An issue was discovered in Xen through 4.9.x allowing guest OS users to
cause a denial of service (host OS crash) or gain host OS privileges by
leveraging an incorrect mask for reference-count overflow checking in
shadow mode.
Notes
 mdeslaur> hypervisor packages are in universe. For
 mdeslaur> issues in the hypervisor, add appropriate
 mdeslaur> tags to each section, ex:
 mdeslaur> Tags_xen: universe-binary
Package
Source: xen (LP Ubuntu Debian)
Upstream:released (4.9.2)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):released (4.9.2-0ubuntu1)
Ubuntu 19.04 (Disco Dingo):not-affected (4.9.2-0ubuntu1)
Ubuntu 19.10 (Eoan):not-affected (4.9.2-0ubuntu1)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-09-19 14:38:14 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)