Information
Files
advisory-307.txt (signed advisory file)
xsa307.meta
xsa307.patch
Advisory
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Xen Security Advisory CVE-2019-19581,CVE-2019-19582 / XSA-307
version 4
find_next_bit() issues
UPDATES IN VERSION 4
====================
Canonicalize version ranges for easier parsing.
ISSUE DESCRIPTION
=================
In a number of places bitmaps are being used by the hypervisor to track
certain state. Iteration over all bits involves functions which may
misbehave in certain corner cases:
- - On 32-bit Arm accesses to bitmaps with bit a count which is a multiple
of 32, an out of bounds access may occur. (CVE-2019-19581)
- - On x86 accesses to bitmaps with a compile time known size of 64 may
incur undefined behavior, which may in particular result in infinite
loops. (CVE-2019-19582)
IMPACT
======
A malicious guest may cause a hypervisor crash or hang, resulting in a
Denial of Service (DoS).
VULNERABLE SYSTEMS
==================
All versions of Xen are vulnerable.
32-bit Arm systems are vulnerable.
x86 systems with 64 or more nodes are vulnerable. We are unaware of any
such systems that Xen would run on.
64-bit Arm systems as well as x86 systems with less than 64 nodes are
not vulnerable.
MITIGATION
==========
There is no known mitigation for 32-bit Arm systems.
For x86 systems the issue can be avoided by suppressing the use of NUMA
information provided by firmware, via the "numa=off" command line
option.
RESOLUTION
==========
Applying the attached patch resolves this issue.
xsa307.patch xen-unstable, Xen 4.13.x - 4.8.x
$ sha256sum xsa307*
e589e96a0b3ec66f1d2d6393b82fab13ed18fd9fb112044a12263336b8499c68 xsa307.meta
7df052768cc05329bc44bf724897227885da8bb2cde9ff01d0ba2a34611bde97 xsa307.patch
$
DEPLOYMENT DURING EMBARGO
=========================
Deployment of the patches and/or mitigations described above (or
others which are substantially similar) is permitted during the
embargo, even on public-facing systems with untrusted guest users and
administrators.
But: Distribution of updated software is prohibited (except to other
members of the predisclosure list).
Predisclosure list members who wish to deploy significantly different
patches and/or mitigations, please contact the Xen Project Security
Team.
(Note: this during-embargo deployment notice is retained in
post-embargo publicly released Xen Project advisories, even though it
is then no longer applicable. This is to enable the community to have
oversight of the Xen Project Security Team's decisionmaking.)
For more information about permissible uses of embargoed information,
consult the Xen Project community's agreed Security Policy:
http://www.xenproject.org/security-policy.html
-----BEGIN PGP SIGNATURE-----
iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl82wNwMHHBncEB4ZW4u
b3JnAAoJEIP+FMlX6CvZ6NQH/is6Piv7oZauOAw5yZQhjm5vO47WtF0rmWGDQ8px
/xSQi47AoSjkt3oBmbGvcbS0dEjAedODkIdfd/5IAcuNgGH1jR0x66b+gxR96tp5
6kMZuYoupoYDxwcIcDQTFfIrmHtXlRPd3VjMM+9SjXH1/q3jjd/5ZcerB2StazWL
nH+Q4dTtVnyJlE2LK31dD9VI9AGWMnsMm9wQyaHDf666XrhUbIbui533xMJ0289D
LZIZORoG7/rWFZO0+UL4RMsil38+j5SCl4DwfSwwo1YHRsrvDPxKpmii7sds2DxX
tT06oN+/w+sXa6Vn0dHB9YLvLA3AkSv9/AbuWszDnd1oxtk=
=SBNy
-----END PGP SIGNATURE-----
Xenproject.org Security Team