CVE-2017-10912
Description
Xen through 4.8.x mishandles page transfer, which allows guest OS users to obtain privileged host OS access, aka XSA-217.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A flaw in Xen's page transfer mechanism allows a malicious pair of PV and HVM guests to gain host-level privileges.
Vulnerability
Xen through 4.8.x mishandles page transfer when a controlling domain unmaps a page owned by a controlled HVM domain without flushing the TLB. If the controlled domain subsequently transfers that page to another PV domain via GNTTABOP_transfer or XENMEM_exchange, and the third domain uses the page as a page table, the controlling domain retains write access to the live page table until the TLB entry is flushed or evicted [1]. All Xen versions are vulnerable on x86 systems; ARM systems are not affected. The attack requires an attacker to control both a PV and an HVM guest [1].
Exploitation
An attacker must control a PV domain (the controlling domain) and an HVM domain (the controlled domain). The controlling domain maps a page of the HVM domain, then unmaps it without flushing the TLB. The HVM domain then transfers the page to a third PV domain (also attacker-controlled) using GNTTABOP_transfer or XENMEM_exchange. The third PV domain uses the page as a page table. At this point, the controlling domain has write access to the live page table until the stale TLB entry is flushed or evicted [1].
Impact
A successful attack gives the controlling domain write access to a live page table of another PV domain. This allows the attacker to access all of system memory, leading to privilege escalation to the host level, host crashes, and information leaks [1].
Mitigation
There is no known workaround for this vulnerability [1]. The fix is to apply the patches provided in XSA-217 (e.g., xsa217.patch) or upgrade to a fixed version such as Xen 4.7.3 or later [2]. Gentoo users can follow the instructions in GLSA 201710-17 to upgrade to >=app-emulation/xen-4.7.3 [2].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
5- osv-coords5 versionspkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%206
< 4.5.5_12-22.18.1+ 4 more
- (no CPE)range: < 4.5.5_12-22.18.1
- (no CPE)range: < 4.4.4_21-22.42.1
- (no CPE)range: < 4.4.4_21-22.42.1
- (no CPE)range: < 4.5.5_12-22.18.1
- (no CPE)range: < 4.5.5_12-22.18.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- xenbits.xen.org/xsa/advisory-217.htmlnvdMailing ListMitigationThird Party Advisory
- www.debian.org/security/2017/dsa-3969nvd
- www.securityfocus.com/bid/99158nvd
- www.securitytracker.com/id/1038721nvd
- security.gentoo.org/glsa/201708-03nvd
- security.gentoo.org/glsa/201710-17nvd
News mentions
0No linked articles in our index yet.