Information
| Advisory | XSA-16 |
| Public release | 2012-09-05 09:12 |
| Updated | 2012-09-05 09:12 |
| Version | 3 |
| CVE(s) | CVE-2012-3498 |
| Title | PHYSDEVOP_map_pirq index vulnerability |
Files
advisory-16.txt (signed advisory file)
xsa16-unstable.patch
xsa16-xen-4.1.patch
Advisory
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Xen Security Advisory CVE-2012-3498 / XSA-16
version 3
PHYSDEVOP_map_pirq index vulnerability
UPDATES IN VERSION 3
====================
Public release. Credit Matthew Daley.
Update version tag format.
ISSUE DESCRIPTION
=================
PHYSDEVOP_map_pirq with MAP_PIRQ_TYPE_GSI does not range check
map->index.
IMPACT
======
A malicious HVM guest kernel can crash the host. It might also be
able to read hypervisor or guest memory.
VULNERABLE SYSTEMS
==================
All Xen systems running HVM guests. PV guests are not vulnerable.
The vulnerability dates back to Xen 4.1. Xen 4.0 is not vulnerable.
4.1, the 4.2 RCs, and xen-unstable.hg are vulnerable.
MITIGATION
==========
This issue can be mitigated by ensuring that the guest kernel is
trustworthy, or by running only PV guests.
RESOLUTION
==========
Applying the appropriate attached patch will resolve the issue.
CREDIT
======
Thanks to Matthew Daley for finding this vulnerability (and that in
XSA-12) and notifying the Xen.org security team.
PATCH INFORMATION
=================
The attached patches resolve this issue
xsa16-unstable.patch xen-unstable
xsa16-xen-4.1.patch Xen 4.1.x
$ sha256sum xsa16-*.patch
f8db42898620112c8e77bf116645d650b3671d4ccc49adcad09c7b4591d55cab xsa16-unstable.patch
4b76d554b23977443209e45d3a2404d63695eb3020ff87a8e16e5e25cbddff31 xsa16-xen-4.1.patch
-----BEGIN PGP SIGNATURE-----
iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAmV8b+UMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZn6QH/36dZQ6Ac/GHpabzBeMufFZTUahlMwl+xa70/CkW
VO88e6hk4am+wROzfRpkqpcSP1byj/KuhPrUtAbP41J7Ied15C38G/LyhsKo5Zwq
H+6SE3uYr6FpW0cGW/NCfl7MWbMQUMt+4+Iu5OHGi1KCEBEGKB2hASYtHHJoZYmH
j1P46ujMIidDqm9uXIOISsSLogMUdraRAk5ZgETIdYlNAfwCEh6h0w7cy/BcnxCk
CjjpFrTtljf9ZM3RZDt6PjMT0N4ybXzvDmtRsPB/oD5bg2gt22GTpwncmphbjIeM
OAUCGbIOp8JfLffVB6I6P60AFC+0cYypbFwpZ/11zE/DEmM=
=zBlI
-----END PGP SIGNATURE-----
Xenproject.org Security Team