Xen and the Linux kernel through 4.5.x do not properly suppress hugetlbfs support in x86 PV guests, which allows local PV guest OS users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://xenbits.xen.org/xsa/xsa174.patch | patch |
http://www.ubuntu.com/usn/USN-3006-1 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-3004-1 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-3001-1 | third party advisory vendor advisory |
http://xenbits.xen.org/xsa/advisory-174.html | vendor advisory |
http://www.ubuntu.com/usn/USN-3005-1 | third party advisory vendor advisory |
http://www.securitytracker.com/id/1035569 | vdb entry third party advisory |
http://www.ubuntu.com/usn/USN-3049-1 | vendor advisory |
http://www.debian.org/security/2016/dsa-3607 | vendor advisory |
http://www.ubuntu.com/usn/USN-3002-1 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-3050-1 | vendor advisory |
http://www.ubuntu.com/usn/USN-3007-1 | third party advisory vendor advisory |
http://www.ubuntu.com/usn/USN-3003-1 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/86068 | vdb entry |