FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

xen-kernel -- x86 PV guests may be able to mask interrupts

Affected packages
xen-kernel < 4.7.1_3

Details

VuXML ID 3ae078ca-c7eb-11e6-ae1b-002590263bf5
Discovery 2016-12-21
Entry 2016-12-22

The Xen Project reports:

Certain PV guest kernel operations (page table writes in particular) need emulation, and use Xen's general x86 instruction emulator. This allows a malicious guest kernel which asynchronously modifies its instruction stream to effect the clearing of EFLAGS.IF from the state used to return to guest context.

A malicious guest kernel administrator can cause a host hang or crash, resulting in a Denial of Service.

References

CVE Name CVE-2016-10024
URL https://xenbits.xen.org/xsa/advisory-202.html