LWN.net Logo

xen: possible privilege escalation

Package(s):xen CVE #(s):CVE-2013-2072
Created:May 28, 2013 Updated:May 30, 2013
Description: From the Red Hat bugzilla:

The Python bindings for the xc_vcpu_setaffinity call do not properly check their inputs. Systems which allow untrusted administrators to configure guest vcpu affinity may be exploited to trigger a buffer overrun and corrupt memory.

An attacker who is able to configure a specific vcpu affinity via a toolstack which uses the Python bindings is able to exploit this issue.

Exploiting this issue leads to memory corruption which may result in a DoS against the system by crashing the toolstack. The possibility of code execution (privilege escalation) has not been ruled out.

The xend toolstack passes a cpumap to this function without sanitization. xend allows the cpumap to be configured via the guest configuration file or the SXP/XenAPI interface. Normally these interfaces are not considered safe to expose to non-trusted parties. However systems which attempt to allow guest administrator control of VCPU affinity in a safe way via xend may expose this issue.

Alerts:
Fedora FEDORA-2013-8590 2013-05-27
Fedora FEDORA-2013-8571 2013-05-27
SUSE SUSE-SU-2013:1075-1 2013-06-25
Mageia MGASA-2013-0197 2013-07-01
openSUSE openSUSE-SU-2013:1392-1 2013-08-30
openSUSE openSUSE-SU-2013:1404-1 2013-09-04

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds