Race condition in QEMU in Xen allows local x86 HVM guest OS administrators to gain privileges by changing certain data on shared rings, aka a "double fetch" vulnerability.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://xenbits.xen.org/xsa/advisory-197.html | third party advisory |
https://security.gentoo.org/glsa/201612-56 | third party advisory vendor advisory |
http://www.securityfocus.com/bid/94476 | vdb entry third party advisory |
https://support.citrix.com/article/CTX218775 | third party advisory |
http://www.securitytracker.com/id/1037344 | vdb entry third party advisory |