Vulnerability Description
An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap error.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Xen | Xen | 4.4.0 |
Related Weaknesses (CWE)
References
- http://www.debian.org/security/2017/dsa-3969
- http://www.securitytracker.com/id/1039568Third Party AdvisoryVDB Entry
- https://xenbits.xen.org/xsa/advisory-235.htmlMitigationPatchVendor Advisory
- http://www.debian.org/security/2017/dsa-3969
- http://www.securitytracker.com/id/1039568Third Party AdvisoryVDB Entry
- https://xenbits.xen.org/xsa/advisory-235.htmlMitigationPatchVendor Advisory
FAQ
What is CVE-2017-15596?
CVE-2017-15596 is a vulnerability with a CVSS score of 6.0 (MEDIUM). An issue was discovered in Xen 4.4.x through 4.9.x allowing ARM guest OS users to cause a denial of service (prevent physical CPU usage) because of lock mishandling upon detection of an add-to-physmap...
How severe is CVE-2017-15596?
CVE-2017-15596 has been rated MEDIUM with a CVSS base score of 6.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-15596?
Check the references section above for vendor advisories and patch information. Affected products include: Xen Xen.