Lucene search

K
xenXen ProjectXSA-148
HistoryOct 29, 2015 - 11:59 a.m.

x86: Uncontrolled creation of large page mappings by PV guests

2015-10-2911:59:00
Xen Project
xenbits.xen.org
35

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.6%

ISSUE DESCRIPTION

The code to validate level 2 page table entries is bypassed when certain conditions are satisfied. This means that a PV guest can create writeable mappings using super page mappings.
Such writeable mappings can violate Xen intended invariants for pages which Xen is supposed to keep read-only.
This is possible even if the “allowsuperpage” command line option is not used.

IMPACT

Malicious PV guest administrators can escalate privilege so as to control the whole system.

VULNERABLE SYSTEMS

Xen 3.4 and onward are vulnerable.
Only x86 systems are vulnerable. ARM systems are not vulnerable.
Only PV guests can exploit the vulnerability. Both 32-bit and 64-bit PV guests can do so.

CPENameOperatorVersion
xenge3.4

7.2 High

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

0.001 Low

EPSS

Percentile

25.6%