Bug 1477651 (CVE-2017-12136, xsa228) - CVE-2017-12136 xsa228 xen: grant_table: Race conditions with maptrack free list handling (XSA-228)
Summary: CVE-2017-12136 xsa228 xen: grant_table: Race conditions with maptrack free li...
Alias: CVE-2017-12136, xsa228
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
Whiteboard: impact=important,public=20170815,repo...
Keywords: Security
Depends On: 1481765
TreeView+ depends on / blocked
Reported: 2017-08-02 14:36 UTC by Adam Mariš
Modified: 2019-06-08 22:12 UTC (History)
13 users (show)

Clone Of:
Last Closed: 2017-08-24 09:23:01 UTC

Attachments (Terms of Use)

Description Adam Mariš 2017-08-02 14:36:33 UTC

The grant table code in Xen has a bespoke semi-lockfree allocator for
recording grant mappings ("maptrack" entries).  This allocator has a
race which allows the free list to be corrupted.

Specifically: the code for removing an entry from the free list, prior
to use, assumes (without locking) that if inspecting head item shows
that it is not the tail, it will continue to not be the tail of the
list if it is later found to be still the head and removed with
cmpxchg.  But the entry might have been removed and replaced, with the
result that it might be the tail by then.  (The invariants for the
semi-lockfree data structure were never formally documented.)

Additionally, a stolen entry is put on the free list with an incorrect
link field, which will very likely corrupt the list.


A malicious guest administrator can crash the host, and can probably
escalate their privilege to that of the host.


Xen 4.6 and later are vulnerable.

Xen 4.5 and earlier are not vulnerable.


There is no mitigation for this vulnerability.

External References:


Comment 2 Adam Mariš 2017-08-15 12:35:12 UTC

Name: the Xen project
Upstream: Ian Jackson (Citrix)

Comment 3 Adam Mariš 2017-08-15 16:15:05 UTC
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1481765]

Note You need to log in before you can comment on or make changes to this bug.