First published: Wed Jul 05 2017(Updated: )
The grant-table feature in Xen through 4.8.x does not ensure sufficient type counts for a GNTMAP_device_map and GNTMAP_host_map mapping, which allows guest OS users to cause a denial of service (count mismanagement and memory corruption) or obtain privileged host OS access, aka XSA-224 bug 2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen xen-unstable | <=4.8.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-10921 has a medium severity rating due to its potential for denial of service and memory corruption.
To fix CVE-2017-10921, upgrade to Xen version 4.8.2 or later, which addresses the vulnerability.
CVE-2017-10921 affects Xen versions up to and including 4.8.1, specifically under configurations using GNTMAP_device_map and GNTMAP_host_map.
The potential impacts of CVE-2017-10921 include denial of service through count mismanagement and the possibility of privileged host OS access.
Yes, CVE-2017-10921 allows guest OS users to exploit the vulnerability, causing mismanagement of resources.