LWN.net Logo

xen: multiple vulnerabilities

Package(s):xen CVE #(s):CVE-2013-2076 CVE-2013-2077 CVE-2013-2078
Created:June 14, 2013 Updated:June 19, 2013
Description:

From the Fedora bugzilla:

On AMD processors supporting XSAVE/XRSTOR (family 15h and up), when an exception is pending, these instructions save/restore only the FOP, FIP, and FDP x87 registers in FXSAVE/FXRSTOR. This allows one domain to determine portions of the state of floating point instructions of other domains.

A malicious domain may be able to leverage this to obtain sensitive information such as cryptographic keys from another domain. (CVE-2013-2076)

Processors do certain validity checks on the data passed to XRSTOR. While the hypervisor controls the placement of that memory block, it doesn't restrict the contents in any way. Thus the hypervisor exposes itself to a fault occurring on XRSTOR. Other than for FXRSTOR, which behaves similarly, there was no exception recovery code attached to XRSTOR.

Malicious or buggy unprivileged user space can cause the entire host to crash. (CVE-2013-2077)

Processors do certain validity checks on the register values passed to XSETBV. For the PV emulation path for that instruction the hypervisor code didn't check for certain invalid bit combinations, thus exposing itself to a fault occurring when invoking that instruction on behalf of the guest.

Malicious or buggy unprivileged user space can cause the entire host to crash. (CVE-2013-2078)

Alerts:
Fedora FEDORA-2013-10136 2013-06-14
SUSE SUSE-SU-2013:1075-1 2013-06-25
Mageia MGASA-2013-0197 2013-07-01
SUSE SUSE-SU-2013:1314-1 2013-08-09
openSUSE openSUSE-SU-2013:1392-1 2013-08-30
openSUSE openSUSE-SU-2013:1404-1 2013-09-04
Gentoo 201309-24 2013-09-27

(Log in to post comments)

Copyright © 2013, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds