-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Xen Security Advisory CVE-2013-1964 / XSA-50 version 2 grant table hypercall acquire/release imbalance UPDATES IN VERSION 2 ==================== Normalize version tags ISSUE DESCRIPTION ================= When releasing a non-v1 non-transitive grant after doing a grant copy operation, Xen incorrectly recurses (as if for a transitive grant) and releases an unrelated grant reference. IMPACT ====== A malicious guest administrator can cause undefined behaviour; depending on the dom0 kernel a host crash is possible, but information leakage or privilege escalation cannot be ruled out. VULNERABLE SYSTEMS ================== Xen 4.0 and 4.1 are vulnerable. Any kind of guest can trigger the vulnerability. Xen 4.2 and xen-unstable, as well as Xen 3.x and earlier, are not vulnerable. MITIGATION ========== Using only trustworthy guest kernels will avoid the vulnerability. Using a debug build of Xen will eliminate the possible information leak or privilege violation; instead, if the vulnerability is attacked, Xen will crash. NOTE REGARDING EMBARGO ====================== A crash resulting from this bug has been reported by a user on the public xen-devel mailing list. There is therefore no embargo. RESOLUTION ========== Applying the attached patch resolves this issue. xsa50-4.1.patch Xen 4.1.x, 4.2.x $ sha256sum xsa50-*.patch 29f76073311a372dd30dd4788447850465d2575d5ff7b2c10912a69e4941fb21 xsa50-4.1.patch $ -----BEGIN PGP SIGNATURE----- iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmV8b+gMHHBncEB4ZW4u b3JnAAoJEIP+FMlX6CvZ5YAH/09hL6h4lhmz9Rqc4RWgSThaUowZvMPzsKDLkH6q tc3712lEhZzYL+QgEXMnrq0R3AIVVCSb5l24zzSXcIQAdlmwfnC3A23fwI1RRAH1 0p47WHPYRrlBFt0JvksbdrTzKHR7h3k3eB+jZvINAAIIzLC+46xI3woz6k9gQdg3 97Mv82Y6AJUThhU+fHrPlHk0VMOTdSXJsRJ8C2OklvDpOV00ggPg9EsgJlyshsyf vPiKVkngmDsA8bmTntdSJCbAsM51JZWhD+UsZE3Uot27TfXMAtcxWLlRM83Gt5gx cmGwEmFdiRC2hHSomkUBZrgRDh3stq2+Kr/FJdZmGuRZ/Vk= =pgf1 -----END PGP SIGNATURE-----