Race condition in Xen - CVE-2017-15588

 

Race condition in Xen - CVE-2017-15588

Published: October 16, 2017 / Updated: July 28, 2020


Vulnerability identifier: #VU8829
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-15588
CWE-ID: CWE-362
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Xen Project
Affected software:
Xen

Detailed vulnerability description

The vulnerability allows an adjacent attacker to gain unauthorized access to system memory.

The weakness exists on x86 PV guest systems due to improper handling of references in memory tables. An adjacent attacker can trigger a race condition while sending a translation lookaside buffer (TLB) flush request that involves an interprocessor interrupt (IPI) to a CPU, access all the system memory and possibly cause the system to crash.

Successful exploitation of the vulnerability may result in denial of service.

How to mitigate CVE-2017-15588

Install update from vendor's website.

Sources