CVE-2017-12134
Description
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in Xen might allow local OS guest users to corrupt block device data streams and consequently obtain sensitive memory information, cause a denial of service, or gain host OS privileges by leveraging incorrect block IO merge-ability calculation.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A flawed block IO merge-ability calculation in Xen PV backends allows a malicious guest to corrupt data streams, leading to info leaks, denial of service, or host privilege escalation.
Vulnerability
The xen_biovec_phys_mergeable function in drivers/xen/biomerge.c in the Linux kernel (versions 2.6.37 and later) incorrectly allows merging of adjacent block I/O requests when Linux is running as a Xen x86 PV guest. This flaw occurs in backend domains (dom0 or PV driver domains) that perform block I/O on behalf of guest VMs, using grant mapping as the transport mechanism. The vulnerability is exposed only when the underlying block device has request merging enabled [1][2].
Exploitation
An attacker must be able to execute code within a guest VM that performs block I/O operations through a vulnerable Xen PV backend. The attacker triggers the flawed merge logic by submitting adjacent block I/O requests that the backend incorrectly coalesces. This requires the backend to have request merging enabled (default behavior) and to use grant mapping; HVM driver domains are not affected. No special privileges beyond guest user access are needed to initiate the attack [1][2].
Impact
A successfully exploited vulnerability allows the guest to cause the backend kernel to read or write incorrect memory when processing a block data stream. This can corrupt the data stream, leading to information disclosure (leaking data from other guests or Xen itself), denial of service (host crash), or privilege escalation to gain administrative control over the host system [1][2][3].
Mitigation
Linux distributions have released patches; for example, Ubuntu published fixed kernels in USN-3655-2 [3]. Red Hat closed the bug as WONTFIX for its product line, indicating that an alternate mitigation (e.g., disabling block request merging in the backend) may be necessary [4]. The vulnerability is not exposed on ARM systems. Administrators should apply the latest kernel updates from their vendor or disable block device request merging in Xen backend domains if patching is not possible [2][3].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
35- osv-coords35 versionspkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_14&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_4&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3
< 4.4.90-92.45.1+ 34 more
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.3
- (no CPE)range: < 4.4.92-6.18.3
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.90-92.45.1
- (no CPE)range: < 4.4.92-6.18.1
- (no CPE)range: < 4.4.88-18.1
- (no CPE)range: < 1-2.4
- (no CPE)range: < 1-4.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
10- xenbits.xen.org/xsa/advisory-229.htmlnvdMitigationPatchVendor Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingMitigationPatchThird Party Advisory
- support.citrix.com/article/CTX225941nvdPatchThird Party Advisory
- www.openwall.com/lists/oss-security/2017/08/15/4nvdMailing ListMitigationThird Party Advisory
- www.securityfocus.com/bid/100343nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1039176nvdThird Party AdvisoryVDB Entry
- www.debian.org/security/2017/dsa-3981nvd
- security.gentoo.org/glsa/201801-14nvd
- usn.ubuntu.com/3655-1/nvd
- usn.ubuntu.com/3655-2/nvd
News mentions
0No linked articles in our index yet.