|Public release ||2013-12-10 12:00|
|Updated ||2013-12-10 12:58|
|Title ||IOMMU TLB flushing may be inadvertently suppressed|
Filesadvisory-80.txt (signed advisory file)
-----BEGIN PGP SIGNED MESSAGE-----
Xen Security Advisory CVE-2013-6400 / XSA-80
IOMMU TLB flushing may be inadvertently suppressed
UPDATES IN VERSION 3
Corrected explanatory text to refer to the correct patch filename.
An internal flag is used to temporarily suppress IOMMU TLB flushes, in
order to consolidate multiple single page flushes into one wider
flush. This flag is not cleared again, on certain error paths. This
can result in TLB flushes not happening when they are needed.
Retaining stale TLB entries could allow guests access to memory that
ought to have been revoked, or grant greater access than intended.
Malicious guest administrators might be able to cause host-wide denial of
service, or escalate their privilege to that of the host.
Only VMs which have been assigned PCI devices can exploit the bug.
Only systems using Intel VT-d are vulnerable, since the bug is in the
VT-d specific code in Xen.
Xen 4.2.x and later are vulnerable.
Xen 4.1.x and earlier are not vulnerable.
This issue can be avoided by not assigning PCI devices to untrusted guests on
systems supporting Intel VT-d.
This issue was discovered by Jan Beulich.
Applying the attached patch resolves this issue.
xsa80.patch Xen 4.2.x, Xen 4.3.x, xen-unstable
$ sha256sum xsa80*.patch
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
-----END PGP SIGNATURE-----
Xenproject.org Security Team