An issue was discovered in Xen 4.9.x through 4.11.x, on Intel x86 platforms, allowing x86 HVM and PVH guests to cause a host OS denial of service (NULL pointer dereference) or possibly have unspecified other impact because nested VT-x is not properly restricted.
The product dereferences a pointer that it expects to be valid but is NULL.
Link | Tags |
---|---|
https://xenbits.xen.org/xsa/advisory-278.html | patch vendor advisory mitigation |
http://www.securitytracker.com/id/1042021 | third party advisory vdb entry |
http://www.securityfocus.com/bid/105817 | third party advisory vdb entry |