Xen IO Request Merging Flaw Lets Local Users on a Guest System Gain Elevated Privileges on the Host System
|
SecurityTracker Alert ID: 1039176 |
SecurityTracker URL: http://securitytracker.com/id/1039176
|
CVE Reference:
CVE-2017-12134
(Links to External Site)
|
Date: Aug 16 2017
|
Impact:
Disclosure of system information, Disclosure of user information, Execution of arbitrary code via local system, User access via local system
|
Fix Available: Yes Vendor Confirmed: Yes
|
|
Description:
A vulnerability was reported in Xen. A local user on the guest system can gain elevated privileges on the host system.
A local user on a Linux-based guest system can trigger a flaw in merging adjacent block IO requests to incorrectly access memory during block stream processing and obtain potentially sensitive information from other guests or from the host system or gain elevated privileges on the host system.
x86 PV guest systems using pvops Linux in a backend role are affected.
Block devices with request merging enabled are affected.
ARM systems are not affected.
Jan H. Schonherr of Amazon reported this vulnerability.
|
Impact:
A local user on the guest system can obtain potentially sensitive information from other guests or the host system and can gain elevated privileges on the host system.
|
Solution:
The vendor has issued a fix (xsa229.patch).
The vendor advisory is available at:
https://xenbits.xen.org/xsa/advisory-229.html
|
Vendor URL: xenbits.xen.org/xsa/advisory-229.html (Links to External Site)
|
Cause:
Access control error
|
Underlying OS: Linux (Any)
|
|
Message History:
This archive entry has one or more follow-up message(s) listed below.
|
Source Message Contents
|
|
[Original Message Not Available for Viewing]
|
|