The shadow-paging feature in Xen through 4.8.x mismanages page references and consequently introduces a race condition, which allows guest OS users to obtain Xen privileges, aka XSA-219.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
https://security.gentoo.org/glsa/201708-03 | vendor advisory |
http://www.debian.org/security/2017/dsa-3969 | vendor advisory |
http://www.securityfocus.com/bid/99174 | third party advisory vdb entry |
https://xenbits.xen.org/xsa/advisory-219.html | vendor advisory mailing list mitigation |
https://security.gentoo.org/glsa/201710-17 | vendor advisory |