{"id":"CVE-2017-17564","details":"An issue was discovered in Xen through 4.9.x allowing guest OS users to cause a denial of service (host OS crash) or gain host OS privileges by leveraging incorrect error handling for reference counting in shadow mode.","modified":"2026-03-12T22:36:29.401839Z","published":"2017-12-12T23:29:00.423Z","related":["SUSE-SU-2018:0438-1","SUSE-SU-2018:0472-1","SUSE-SU-2018:0601-1","SUSE-SU-2018:0609-1","SUSE-SU-2018:0638-1","SUSE-SU-2018:0678-1"],"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/01/msg00003.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2018/10/msg00009.html"},{"type":"WEB","url":"http://www.securitytracker.com/id/1040770"},{"type":"WEB","url":"https://support.citrix.com/article/CTX232096"},{"type":"WEB","url":"http://www.securityfocus.com/bid/102172"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201801-14"},{"type":"ADVISORY","url":"https://www.debian.org/security/2018/dsa-4112"},{"type":"FIX","url":"https://xenbits.xen.org/xsa/advisory-250.html"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2017/12/12/3"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"4.9.1"}]}],"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-17564.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H"}]}