CVE Vulnerabilities

CVE-2017-8905

Incorrect Calculation

Published: May 11, 2017 | Modified: Apr 20, 2025
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:L/AC:L/Au:S/C:C/I:C/A:C
RedHat/V2
RedHat/V3
8.5 IMPORTANT
CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.

Weakness

The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.

Affected Software

NameVendorStart VersionEnd Version
XenXen4.6.0 (including)4.6.0 (including)
XenXen4.6.1 (including)4.6.1 (including)
XenXen4.6.2 (including)4.6.2 (including)
XenXen4.6.3 (including)4.6.3 (including)
XenXen4.6.4 (including)4.6.4 (including)
XenXen4.6.5 (including)4.6.5 (including)
XenUbuntudevel*
XenUbuntuesm-infra/xenial*
XenUbuntutrusty*
XenUbuntuxenial*
XenUbuntuyakkety*
XenUbuntuzesty*

Potential Mitigations

  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).
  • Use languages, libraries, or frameworks that make it easier to handle numbers without unexpected consequences.
  • Examples include safe integer handling packages such as SafeInt (C++) or IntegerLib (C or C++).

References