Xen through 4.6.x on 64-bit platforms mishandles a failsafe callback, which might allow PV guest OS users to execute arbitrary code on the host OS, aka XSA-215.
The product performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Xen | Xen | 4.6.0 (including) | 4.6.0 (including) |
Xen | Xen | 4.6.1 (including) | 4.6.1 (including) |
Xen | Xen | 4.6.2 (including) | 4.6.2 (including) |
Xen | Xen | 4.6.3 (including) | 4.6.3 (including) |
Xen | Xen | 4.6.4 (including) | 4.6.4 (including) |
Xen | Xen | 4.6.5 (including) | 4.6.5 (including) |
Xen | Ubuntu | devel | * |
Xen | Ubuntu | trusty | * |
Xen | Ubuntu | xenial | * |
Xen | Ubuntu | yakkety | * |
Xen | Ubuntu | zesty | * |