An issue was discovered in Xen through 4.11.x allowing x86 PV guest OS users to cause a denial of service or gain privileges by leveraging a page-writability race condition during addition of a passed-through PCI device.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://xenbits.xen.org/xsa/advisory-285.html | patch vendor advisory |
https://xenbits.xen.org/xsa/advisory-285.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2019/10/25/6 | mailing list |
https://www.debian.org/security/2020/dsa-4602 | third party advisory vendor advisory |
https://seclists.org/bugtraq/2020/Jan/21 | third party advisory mailing list |