The grant-table feature in Xen through 4.8.x has a race condition leading to a double free, which allows guest OS users to cause a denial of service (memory consumption), or possibly obtain sensitive information or gain privileges, aka XSA-218 bug 2.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.securitytracker.com/id/1038722 | vdb entry |
https://security.gentoo.org/glsa/201708-03 | vendor advisory |
http://www.debian.org/security/2017/dsa-3969 | vendor advisory |
http://www.securityfocus.com/bid/99411 | third party advisory vdb entry |
https://xenbits.xen.org/xsa/advisory-218.html | vendor advisory mailing list |
https://security.gentoo.org/glsa/201710-17 | vendor advisory |