vulnerability

FreeBSD: VID-4bf57137-ba4d-11e6-ae1b-002590263bf5 (CVE-2016-7154): xen-kernel -- use after free in FIFO event channel code

Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Dec 4, 2016
Added
Dec 4, 2016
Modified
Dec 10, 2025

Description

The Xen Project reports: When the EVTCHNOP_init_control operation is called with a bad guest frame number, it takes an error path which frees a control structure without also clearing the corresponding pointer. Certain subsequent operations (EVTCHNOP_expand_array or another EVTCHNOP_init_control), upon finding the non-NULL pointer, continue operation assuming it points to allocated memory. A malicious guest administrator can crash the host, leading to a DoS. Arbitrary code execution (and therefore privilege escalation), and information leaks, cannot be excluded.

Solution

freebsd-upgrade-package-xen-kernel
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.