CVE-2019-17342
Published: 08 October 2019
An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a race condition that arose when XENMEM_exchange was introduced.
Priority
CVSS 3 base score: 7.0
Status
Package | Release | Status |
---|---|---|
xen Launchpad, Ubuntu, Debian |
Upstream |
Needs triage
|
Ubuntu 20.10 (Groovy Gorilla) |
Needs triage
|
|
Ubuntu 20.04 LTS (Focal Fossa) |
Needs triage
|
|
Ubuntu 18.04 LTS (Bionic Beaver) |
Needs triage
|
|
Ubuntu 16.04 LTS (Xenial Xerus) |
Needs triage
|
|
Ubuntu 14.04 ESM (Trusty Tahr) |
Does not exist
|
|
Binaries built from this source package are in Universe and so are supported by the community. |
Notes
Author | Note |
---|---|
mdeslaur | hypervisor packages are in universe. For issues in the hypervisor, add appropriate tags to each section, ex: Tags_xen: universe-binary |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17342
- https://xenbits.xen.org/xsa/advisory-287.html
- NVD
- Launchpad
- Debian