The do_physdev_op function in Xen 4.1.5, 4.1.6.1, 4.2.2 through 4.2.3, and 4.3.x does not properly restrict access to the (1) PHYSDEVOP_prepare_msix and (2) PHYSDEVOP_release_msix operations, which allows local PV guests to cause a denial of service (host or guest malfunction) or possibly gain privileges via unspecified vectors.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://osvdb.org/102536 | vdb entry |
http://www.securityfocus.com/bid/65125 | vdb entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/90675 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00011.html | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127607.html | vendor advisory |
http://support.citrix.com/article/CTX200288 | |
http://security.gentoo.org/glsa/glsa-201407-03.xml | vendor advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-February/127580.html | vendor advisory |
http://www.openwall.com/lists/oss-security/2014/01/24/6 | mailing list |
http://www.securitytracker.com/id/1029684 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2014-03/msg00010.html | vendor advisory |
http://xenbits.xen.org/xsa/advisory-87.html | |
http://secunia.com/advisories/56650 | third party advisory vendor advisory |
http://xenbits.xen.org/xsa/xsa87-unstable-4.3.patch | patch vendor advisory |