An issue was discovered in the Linux kernel 5.5 through 5.7.9, as used in Xen through 4.13.x for x86 PV guests. An attacker may be granted the I/O port permissions of an unrelated task. This occurs because tss_invalidate_io_bitmap mishandling causes a loss of synchronization between the I/O bitmaps of TSS and Xen, aka CID-cadfad870154.
During installation, installed file permissions are set to allow anyone to modify those files.
Link | Tags |
---|---|
http://xenbits.xen.org/xsa/advisory-329.html | third party advisory patch |
https://github.com/torvalds/linux/commit/cadfad870154e14f745ec845708bc17d166065f2 | third party advisory patch |
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cadfad870154e14f745ec845708bc17d166065f2 | mailing list patch vendor advisory |
http://www.openwall.com/lists/oss-security/2020/07/21/2 | third party advisory mailing list |
https://security.netapp.com/advisory/ntap-20200810-0001/ | third party advisory |