First published: Wed Aug 02 2017(Updated: )
ISSUE DESCRIPTION ================= The grant table code in Xen has a bespoke semi-lockfree allocator for recording grant mappings ("maptrack" entries). This allocator has a race which allows the free list to be corrupted. Specifically: the code for removing an entry from the free list, prior to use, assumes (without locking) that if inspecting head item shows that it is not the tail, it will continue to not be the tail of the list if it is later found to be still the head and removed with cmpxchg. But the entry might have been removed and replaced, with the result that it might be the tail by then. (The invariants for the semi-lockfree data structure were never formally documented.) Additionally, a stolen entry is put on the free list with an incorrect link field, which will very likely corrupt the list. IMPACT ====== A malicious guest administrator can crash the host, and can probably escalate their privilege to that of the host. VULNERABLE SYSTEMS ================== Xen 4.6 and later are vulnerable. Xen 4.5 and earlier are not vulnerable. MITIGATION ========== There is no mitigation for this vulnerability. External References: <a href="http://xenbits.xen.org/xsa/advisory-228.html">http://xenbits.xen.org/xsa/advisory-228.html</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Xen Xen | =4.6.0 | |
Xen Xen | =4.6.1 | |
Xen Xen | =4.6.3 | |
Xen Xen | =4.6.4 | |
Xen Xen | =4.6.5 | |
Xen Xen | =4.6.6 | |
Xen Xen | =4.7.0 | |
Xen Xen | =4.7.1 | |
Xen Xen | =4.7.2 | |
Xen Xen | =4.7.3 | |
Xen Xen | =4.8.0 | |
Xen Xen | =4.8.1 | |
Xen Xen | =4.9.0 | |
Citrix XenServer | =6.0.2 | |
Citrix XenServer | =6.2.0 | |
Citrix XenServer | =6.5 | |
Citrix XenServer | =7.0 | |
Citrix XenServer | =7.1 | |
Citrix XenServer | =7.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.