UBUNTU-CVE-2019-18423

See a problem?
Source
https://ubuntu.com/security/notices/UBUNTU-CVE-2019-18423
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-18423.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2019-18423
Related
Published
2019-10-31T14:15:00Z
Modified
2019-10-31T14:15:00Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

An issue was discovered in Xen through 4.12.x allowing ARM guest OS users to cause a denial of service via a XENMEMaddtophysmap hypercall. p2m->maxmappedgfn is used by the functions p2mresolvetranslationfault() and p2mgetentry() to sanity check guest physical frame. The rest of the code in the two functions will assume that there is a valid root table and check that with BUGON(). The function p2mgetrootpointer() will ignore the unused top bits of a guest physical frame. This means that the function p2msetentry() will alias the frame. However, p2m->maxmappedgfn will be updated using the original frame. It would be possible to set p2m->maxmappedgfn high enough to cover a frame that would lead p2mgetrootpointer() to return NULL in p2mgetentry() and p2mresolvetranslationfault(). Additionally, the sanity check on p2m->maxmappedgfn is off-by-one allowing "highest mapped + 1" to be considered valid. However, p2mgetrootpointer() will return NULL. The problem could be triggered with a specially crafted hypercall XENMEMaddtophysmap{, batch} followed by an access to an address (via hypercall or direct access) that passes the sanity check but cause p2mgetrootpointer() to return NULL. A malicious guest administrator may cause a hypervisor crash, resulting in a Denial of Service (DoS). Xen version 4.8 and newer are vulnerable. Only Arm systems are vulnerable. x86 systems are not affected.

References

Affected packages

Ubuntu:Pro:16.04:LTS / xen

Package

Name
xen

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.5.1-0ubuntu1
4.5.1-0ubuntu2
4.6.0-1ubuntu1
4.6.0-1ubuntu2
4.6.0-1ubuntu4
4.6.0-1ubuntu4.1
4.6.0-1ubuntu4.2
4.6.0-1ubuntu4.3
4.6.5-0ubuntu1
4.6.5-0ubuntu1.1
4.6.5-0ubuntu1.2
4.6.5-0ubuntu1.4

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / xen

Package

Name
xen

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

4.*

4.9.0-0ubuntu3
4.9.0-0ubuntu4
4.9.2-0ubuntu1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:20.04:LTS / xen

Package

Name
xen
Purl
pkg:deb/ubuntu/xen@4.11.3+24-g14b62ab3e5-1ubuntu1?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
4.11.3+24-g14b62ab3e5-1ubuntu1

Affected versions

4.*

4.9.2-0ubuntu2
4.9.2-0ubuntu6
4.9.2-0ubuntu7

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "xen-doc": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxengnttab1": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxendevicemodel1-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-hypervisor-4.11-armhf": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-hypervisor-4.9-armhf": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxenevtchn1-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxentoolcore1-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxentoollog1-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-hypervisor-common": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-hypervisor-4.9-arm64": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxenforeignmemory1": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxencall1": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-utils-common-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-utils-4.11-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxenmisc4.11-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-system-arm64": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xenstore-utils-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxenstore3.0": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-hypervisor-4.11-arm64": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxengnttab1-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxenstore3.0-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-hypervisor-4.9-amd64": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxenforeignmemory1-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxendevicemodel1": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxen-dev": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-system-amd64": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxentoolcore1": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxencall1-dbgsym": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xenstore-utils": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxenevtchn1": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-utils-common": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-system-armhf": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxentoollog1": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-hypervisor-4.11-amd64": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "xen-utils-4.11": "4.11.3+24-g14b62ab3e5-1ubuntu1",
            "libxenmisc4.11": "4.11.3+24-g14b62ab3e5-1ubuntu1"
        }
    ]
}