arch/x86/mm.c in Xen allows local PV guest OS users to gain host OS privileges via vectors related to map_grant_ref.
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
Link | Tags |
---|---|
https://support.citrix.com/article/CTX225941 | third party advisory patch |
http://www.openwall.com/lists/oss-security/2017/08/15/2 | mailing list patch mitigation third party advisory |
http://www.securitytracker.com/id/1039174 | vdb entry third party advisory |
https://bugzilla.redhat.com/show_bug.cgi?id=1477657 | issue tracking third party advisory patch |
http://www.debian.org/security/2017/dsa-3969 | third party advisory vendor advisory |
https://security.gentoo.org/glsa/201801-14 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/100342 | vdb entry third party advisory |
http://xenbits.xen.org/xsa/advisory-227.html | patch vendor advisory |