Race Condition Affecting xen-tools package, versions <4.10.4_26-3.61.1


Severity

Recommended
0.0
high
0
10

Based on SUSE Linux Enterprise Server security rating.

Threat Intelligence

EPSS
0.05% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Race Condition vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-SLES150-XENTOOLS-2665718
  • published14 Apr 2022
  • disclosed3 Sept 2021

Introduced: 3 Sep 2021

CVE-2021-28697  (opens in a new tab)
CWE-362  (opens in a new tab)

How to fix?

Upgrade SLES:15.0 xen-tools to version 4.10.4_26-3.61.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream xen-tools package and not the xen-tools package as distributed by SLES. See How to fix? for SLES:15.0 relevant fixed versions and status.

grant table v2 status pages may remain accessible after de-allocation Guest get permitted access to certain Xen-owned pages of memory. The majority of such pages remain allocated / associated with a guest for its entire lifetime. Grant table v2 status pages, however, get de-allocated when a guest switched (back) from v2 to v1. The freeing of such pages requires that the hypervisor know where in the guest these pages were mapped. The hypervisor tracks only one use within guest space, but racing requests from the guest to insert mappings of these pages may result in any of them to become mapped in multiple locations. Upon switching back from v2 to v1, the guest would then retain access to a page that was freed and perhaps re-used for other purposes.

CVSS Scores

version 3.1