[kernel-xen] Xen Security Advisory 108 (CVE-2014-7188) - Improper MSR range used for x2APIC emulation
Steven Haigh
netwiz at crc.id.au
Wed Oct 1 22:16:47 EST 2014
Xen Security Advisory CVE-2014-7188 / XSA-108
version 4
Improper MSR range used for x2APIC emulation
UPDATES IN VERSION 4
====================
Public release.
ISSUE DESCRIPTION
=================
The MSR range specified for APIC use in the x2APIC access model spans
256 MSRs. Hypervisor code emulating read and write accesses to these
MSRs erroneously covered 1024 MSRs. While the write emulation path is
written such that accesses to the extra MSRs would not have any bad
effect (they end up being no-ops), the read path would (attempt to)
access memory beyond the single page set up for APIC emulation.
IMPACT
======
A buggy or malicious HVM guest can crash the host or read data
relating to other guests or the hypervisor itself.
VULNERABLE SYSTEMS
==================
Xen 4.1 and onward are vulnerable.
Only x86 systems are vulnerable. ARM systems are not vulnerable.
MITIGATION
==========
Running only PV guests will avoid this vulnerability.
CREDITS
=======
This issue was discovered Jan Beulich at SUSE.
RESOLUTION
==========
Fixed in xen-4.2.5-3, xen44-4.4.1-2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 834 bytes
Desc: OpenPGP digital signature
URL: <https://lists.wireless.org.au/pipermail/kernel-xen/attachments/20141001/48da2be6/attachment.sig>
More information about the kernel-xen
mailing list