An issue was discovered in Xen through 4.9.x allowing x86 PV guest OS users to cause a denial of service (unbounded recursion, stack consumption, and hypervisor crash) or possibly gain privileges via crafted page-table stacking.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2018/10/msg00021.html | mailing list |
https://xenbits.xen.org/xsa/advisory-240.html | patch vendor advisory mitigation |
https://lists.debian.org/debian-lts-announce/2017/11/msg00027.html | mailing list |
https://www.debian.org/security/2017/dsa-4050 | vendor advisory |
https://www.exploit-db.com/exploits/43014/ | exploit |
https://support.citrix.com/article/CTX228867 | |
https://security.gentoo.org/glsa/201801-14 | vendor advisory |