The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Link | Tags |
---|---|
https://support.citrix.com/article/CTX225941 | third party advisory patch |
http://www.securitytracker.com/id/1039176 | vdb entry third party advisory |
http://xenbits.xen.org/xsa/advisory-229.html | patch vendor advisory mitigation |
http://www.debian.org/security/2017/dsa-3981 | vendor advisory |
https://usn.ubuntu.com/3655-1/ | vendor advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1477656 | issue tracking patch mitigation third party advisory |
https://security.gentoo.org/glsa/201801-14 | vendor advisory |
https://usn.ubuntu.com/3655-2/ | vendor advisory |
http://www.openwall.com/lists/oss-security/2017/08/15/4 | mailing list third party advisory mitigation |
http://www.securityfocus.com/bid/100343 | vdb entry third party advisory |