Xen through 4.8.x does not validate the port numbers of polled event channel ports, which allows guest OS users to cause a denial of service (NULL pointer dereference and host OS crash) or possibly obtain sensitive information, aka XSA-221.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201708-03 | vendor advisory |
http://www.debian.org/security/2017/dsa-3969 | vendor advisory |
https://xenbits.xen.org/xsa/advisory-221.html | mailing list mitigation third party advisory |
http://www.securityfocus.com/bid/99157 | vdb entry |
http://www.securitytracker.com/id/1038731 | vdb entry |