Lucene search

K
freebsdFreeBSD8C31B288-27EC-11E5-A4A5-002590263BF5
HistoryJun 11, 2015 - 12:00 a.m.

xen-kernel -- vulnerability in the iret hypercall handler

2015-06-1100:00:00
vuxml.freebsd.org
13

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

25.7%

The Xen Project reports:

A buggy loop in Xen’s compat_iret() function iterates the wrong way
around a 32-bit index. Any 32-bit PV guest kernel can trigger this
vulnerability by attempting a hypercall_iret with EFLAGS.VM set.
Given the use of __get/put_user(), and that the virtual addresses
in question are contained within the lower canonical half, the guest
cannot clobber any hypervisor data. Instead, Xen will take up to
2^33 pagefaults, in sequence, effectively hanging the host.
Malicious guest administrators can cause a denial of service
affecting the whole system.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchxen-kernel= 3.1UNKNOWN
FreeBSDanynoarchxen-kernel< 4.5.0_3UNKNOWN

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.001 Low

EPSS

Percentile

25.7%