CVE-2017-15594
Description
An issue was discovered in Xen through 4.9.x allowing x86 SVM PV guest OS users to cause a denial of service (hypervisor crash) or gain privileges because IDT settings are mishandled during CPU hotplugging.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Xen versions 3.2 through 4.9.x on AMD SVM systems mishandle IDT settings during CPU hotplug, allowing a PV guest to escalate privileges or crash the hypervisor.
Vulnerability
An issue in Xen versions 3.2 through 4.9.x on x86 systems using AMD SVM extensions allows incorrect handling of Interrupt Descriptor Table (IDT) settings during CPU hotplugging [1]. When a new CPU is brought online, its IDT is copied from CPU0, and if CPU0 is in HVM guest context at that moment, the selector fields for Interrupt Stack Table (IST) entries are incorrectly installed on the new CPU [1]. This condition exposes a vulnerability only exploitable by PV guests, requiring the presence of an HVM guest on CPU0 during hotplug [1].
Exploitation
An attacker with control of a PV guest can exploit this vulnerability when a CPU is hotplugged while CPU0 is running an HVM guest [1]. The PV guest must be the first vCPU scheduled on the newly hotplugged CPU [1]. No additional authentication or network access is required beyond guest-level privileges. The incorrect IDT settings allow the PV guest to manipulate interrupt handling to escalate privileges or crash the hypervisor [1].
Impact
A malicious or buggy x86 PV guest can escalate its privileges to the hypervisor level or cause a denial of service (hypervisor crash) [1]. The impact is severe because it allows a guest to compromise the entire host system.
Mitigation
Xen has released patches for this issue (XSA-244) on 2017-10-12 [1]. Affected users should apply the corresponding patch for their Xen version (4.5, 4.6, 4.7, or 4.9) [1]. For Gentoo systems, upgrading to app-emulation/xen-4.9.1-r1 and app-emulation/xen-tools-4.9.1-r1 mitigates the vulnerability [2]. As a workaround, avoid hotplugging CPUs while any HVM guest is running [1]. The vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) catalog.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
13- osv-coords13 versionspkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/xen&distro=SUSE%20OpenStack%20Cloud%206
< 4.7.3_06-43.15.1+ 12 more
- (no CPE)range: < 4.7.3_06-43.15.1
- (no CPE)range: < 4.2.5_21-45.11.1
- (no CPE)range: < 4.2.5_21-45.11.1
- (no CPE)range: < 4.4.4_24-61.12.1
- (no CPE)range: < 4.5.5_18-22.31.1
- (no CPE)range: < 4.7.3_06-43.15.1
- (no CPE)range: < 4.4.4_24-22.54.1
- (no CPE)range: < 4.4.4_24-61.12.1
- (no CPE)range: < 4.5.5_18-22.31.1
- (no CPE)range: < 4.7.3_06-43.15.1
- (no CPE)range: < 4.4.4_24-61.12.1
- (no CPE)range: < 4.7.3_06-43.15.1
- (no CPE)range: < 4.5.5_18-22.31.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- xenbits.xen.org/xsa/advisory-244.htmlnvdMitigationPatchVendor Advisory
- www.securitytracker.com/id/1039568nvdThird Party AdvisoryVDB Entry
- lists.debian.org/debian-lts-announce/2018/10/msg00021.htmlnvd
- security.gentoo.org/glsa/201801-14nvd
- support.citrix.com/article/CTX228867nvd
- www.debian.org/security/2017/dsa-4050nvd
News mentions
0No linked articles in our index yet.