|Public release ||2014-01-23 12:00|
|Updated ||2014-01-23 14:26|
|Title ||Out-of-memory condition yielding memory corruption during IRQ setup|
Filesadvisory-83.txt (signed advisory file)
-----BEGIN PGP SIGNED MESSAGE-----
Xen Security Advisory CVE-2014-1642 / XSA-83
Out-of-memory condition yielding memory corruption during IRQ setup
UPDATES IN VERSION 3
When setting up the IRQ for a passed through physical device, a flaw
in the error handling could result in a memory allocation being used
after it is freed, and then freed a second time. This would typically
result in memory corruption.
Malicious guest administrators can trigger a use-after-free error, resulting
in hypervisor memory corruption. The effects of memory corruption could be
anything, including a host-wide denial of service, or privilege escalation.
Xen 4.2.x and later are vulnerable.
Xen 4.1.x and earlier are not vulnerable.
Only systems making use of device passthrough are vulnerable.
Only systems with a 64-bit hypervisor configured to support more than 128
CPUs or with a 32-bit hypervisor configured to support more than 64 CPUs are
This issue can be avoided by not assigning PCI devices to untrusted guests on
systems supporting Intel VT-d or AMD Vi.
This issue was discovered by Coverity Scan, prompted by modelling
improvements contributed by Andrew Coooper. The issue was diagnosed
by Matthew Daley and Andrew Coooper. The patch was prepared by Andrew
Applying the attached patch resolves this issue.
xsa83.patch Xen 4.2.x, Xen 4.3.x, xen-unstable
$ sha256sum xsa83*.patch
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
-----END PGP SIGNATURE-----
Xenproject.org Security Team