CVE-2017-7228 (retired)

Priority
Description
An issue (known as XSA-212) was discovered in Xen, with fixes available for
4.8.x, 4.7.x, 4.6.x, 4.5.x, and 4.4.x. The earlier XSA-29 fix introduced an
insufficient check on XENMEM_exchange input, allowing the caller to drive
hypervisor memory accesses outside of the guest provided input/output
arrays.
Package
Source: xen (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):released (4.6.5-0ubuntu1.1)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2019-08-23 09:18:36 UTC (commit 436fd4ed4cf0038ddd382cb8649607ace163dda7)