Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
aports
aports
  • Project overview
    • Project overview
    • Details
    • Activity
    • Releases
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 673
    • Issues 673
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Merge Requests 175
    • Merge Requests 175
  • CI / CD
    • CI / CD
    • Pipelines
    • Jobs
    • Schedules
  • Operations
    • Operations
    • Incidents
    • Environments
  • Analytics
    • Analytics
    • CI / CD
    • Repository
    • Value Stream
  • Members
    • Members
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • alpine
  • aportsaports
  • Issues
  • #2125

Closed
Open
Opened Jun 26, 2013 by Peter Kotcauer@kocka

[v2.5] Xen Security Advisory 58 (CVE-2013-1432) - Page reference counting error due to XSA-45/CVE-2013-1918 fixes

references:
http://lists.xen.org/archives/html/xen-announce/2013-06/msg00012.html

ISSUE DESCRIPTION

The XSA-45/CVE-2013-1918 patch making error handling paths preemptible broke
page reference counting by not retaining a reference on pages stored for
deferred cleanup. This would lead to the hypervisor prematurely attempting to
free the page, generally crashing upon finding the page still in use.

CREDITS

Thanks to Andrew Cooper and the Citrix XenServer team for discovering
and reporting this vulnerability, and helping investigate it.

IMPACT

Malicious or buggy PV guest kernels can mount a denial of service attack
affecting the whole system. It can’t be excluded that this could also be
exploited to mount a privilege escalation attack.

VULNERABLE SYSTEMS

All Xen versions having the XSA-45/CVE-2013-1918 fixes applied are vulnerable.

The vulnerability is only exposed by PV guests.

MITIGATION

Running only HVM guests, or PV guests with trusted kernels, will avoid this
vulnerability.

RESOLUTION

Applying the appropriate attached patch resolves this issue.

xsa58-4.1.patch Xen 4.1.x
xsa58-4.2.patch Xen 4.2.x
xsa58-unstable.patch xen-unstable

$ sha256sum xsa58*.patch
3623ec87e5a2830f0d41de19a8e448d618954973c3264727a1f3a095f15a8641 xsa58-4.1.patch
194d6610fc38b767d643e5d58a1268f45921fb35e309b47aca6a388b861311c2 xsa58-4.2.patch
2c94b099d7144d03c0f7f44e892a521537fc040d11bc46f84a2438eece46a0f5 xsa58-unstable.patch

(from redmine: issue id 2125, created on 2013-06-26, closed on 2013-07-03)

  • Relations:
    • parent #2123 (closed)
  • Changesets:
    • Revision 02b9902f by Natanael Copa on 2013-07-01T16:49:55Z:
main/xen: fix xsa45 and xsa58 (CVE-2013-1918,CVE-2013-1432)

ref #2123
fixes #2125

(cherry picked from commit 448e4822bbf8a2b4aa8b8f8d8153a2a0b4e0efda)

Conflicts:
	main/xen/APKBUILD
To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
Alpine 2.5.5
Milestone
Alpine 2.5.5 (Past due)
Assign milestone
Time tracking
None
Due date
None
Reference: alpine/aports#2125