switch list corruption vulnerability (XSA-26) CVE-2012-5510-xsa26.patch - bnc#789944 - VUL-0: CVE-2012-5511: xen: Several HVM operations do not validate the range of their inputs (XSA-27) CVE-2012-5511-xsa27.patch - bnc#789951 - VUL-0: CVE-2012-5513: xen: XENMEM_exchange may overwrite hypervisor memory (XSA-29) CVE-2012-5513-xsa29.patch - bnc#789948 - VUL-0: CVE-2012-5514: xen: Missing unlock in guest_physmap_mark_populate_on_demand() (XSA-30) CVE-2012-5514-xsa30.patch - bnc#789950 - VUL-0: CVE-2012-5515: xen: Several memory hypercall operations allow invalid extent order values (XSA-31) CVE-2012-5515-xsa31.patch - bnc#789952 - VUL-0: CVE-2012-5525: xen: Several hypercalls do not validate input GFNs (XSA-32) CVE-2012-5525-xsa32.patch - Upstream patches from Jan 26129-ACPI-BGRT-invalidate.patch 26132-tmem-save-NULL-check.patch 26134-x86-shadow-invlpg-check.patch 26139-cpumap-masking.patch 26148-vcpu-timer-overflow.patch (Replaces CVE-2012-4535-xsa20.patch) 26149-x86-p2m-physmap-error-path.patch (Replaces CVE-2012-4537-xsa22.patch) 26150-x86-shadow-unhook-toplevel-check.patch (Replaces CVE-2012-4538-xsa23.patch) 26151-gnttab-compat-get-status-frames.patch (Replaces CVE-2012-4539-xsa24.patch) 26179-PCI-find-next-cap.patch 26183-x86-HPET-masking.patch 26188-x86-time-scale-asm.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=216
34 lines
1.2 KiB
Diff
34 lines
1.2 KiB
Diff
References: CVE-2012-4539 XSA-24 bnc#786520
|
|
|
|
# HG changeset patch
|
|
# User Ian Jackson <Ian.Jackson@eu.citrix.com>
|
|
# Date 1352893537 0
|
|
# Node ID b64a7d868f06c730a444e990da1a4d816ce3f5dc
|
|
# Parent c7a01b6450e483ca839228bf1e1e44de692e3458
|
|
compat/gnttab: Prevent infinite loop in compat code
|
|
|
|
c/s 20281:95ea2052b41b, which introduces Grant Table version 2
|
|
hypercalls introduces a vulnerability whereby the compat hypercall
|
|
handler can fall into an infinite loop.
|
|
|
|
If the watchdog is enabled, Xen will die after the timeout.
|
|
|
|
This is a security problem, XSA-24 / CVE-2012-4539.
|
|
|
|
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
|
|
Acked-by: Jan Beulich <jbeulich@suse.com>
|
|
Acked-by: Ian Jackson <ian.jackson@eu.citrix.com>
|
|
Committed-by: Ian Jackson <ian.jackson@eu.citrix.com>
|
|
|
|
--- a/xen/common/compat/grant_table.c
|
|
+++ b/xen/common/compat/grant_table.c
|
|
@@ -318,6 +318,8 @@ int compat_grant_table_op(unsigned int c
|
|
#undef XLAT_gnttab_get_status_frames_HNDL_frame_list
|
|
if ( unlikely(__copy_to_guest(cmp_uop, &cmp.get_status, 1)) )
|
|
rc = -EFAULT;
|
|
+ else
|
|
+ i = 1;
|
|
}
|
|
break;
|
|
}
|