Xen through 4.8.x does not validate memory allocations during certain P2M operations, which allows guest OS users to obtain privileged host OS access, aka XSA-222.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1038732 | vdb entry |
https://security.gentoo.org/glsa/201708-03 | vendor advisory |
http://www.debian.org/security/2017/dsa-3969 | vendor advisory |
https://security.gentoo.org/glsa/201710-17 | vendor advisory |
http://www.securityfocus.com/bid/99161 | vdb entry third party advisory |
https://xenbits.xen.org/xsa/advisory-222.html | mailing list third party advisory mitigation |