x86 HVM hypercalls may trigger Xen bug check
Description
Unlike 32-bit PV guests, HVM guests may switch freely between 64-bit and other modes. This in particular means that they may set registers used to pass 32-bit-mode hypercall arguments to values outside of the range 32-bit code would be able to set them to.
When processing of hypercalls takes a considerable amount of time, the hypervisor may choose to invoke a hypercall continuation. Doing so involves putting (perhaps updated) hypercall arguments in respective registers. For guests not running in 64-bit mode this further involves a certain amount of translation of the values.
Unfortunately internal sanity checking of these translated values assumes high halves of registers to always be clear when invoking a hypercall. When this is found not to be the case, it triggers a consistency check in the hypervisor and causes a crash.
Affected products
22- osv-coords21 versionspkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%20Micro%205.3pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%20Micro%205.4pkg:rpm/opensuse/xen&distro=openSUSE%20Leap%20Micro%205.5pkg:rpm/opensuse/xen&distro=openSUSE%20Tumbleweedpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.1pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.3pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.4pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Micro%205.5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/xen&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5
< 4.17.4_02-150500.3.30.1+ 20 more
- (no CPE)range: < 4.17.4_02-150500.3.30.1
- (no CPE)range: < 4.18.2_06-150600.3.3.1
- (no CPE)range: < 4.16.6_02-150400.4.55.1
- (no CPE)range: < 4.16.6_02-150400.4.55.1
- (no CPE)range: < 4.17.4_04-150500.3.33.1
- (no CPE)range: < 4.18.2_02-1.1
- (no CPE)range: < 4.13.5_12-150200.3.93.1
- (no CPE)range: < 4.14.6_14-150300.3.72.1
- (no CPE)range: < 4.14.6_14-150300.3.72.1
- (no CPE)range: < 4.16.6_02-150400.4.55.1
- (no CPE)range: < 4.16.6_02-150400.4.55.1
- (no CPE)range: < 4.17.4_02-150500.3.30.1
- (no CPE)range: < 4.17.4_02-150500.3.30.1
- (no CPE)range: < 4.18.2_06-150600.3.3.1
- (no CPE)range: < 4.17.4_02-150500.3.30.1
- (no CPE)range: < 4.18.2_06-150600.3.3.1
- (no CPE)range: < 4.12.4_48-3.109.1
- (no CPE)range: < 4.13.5_12-150200.3.93.1
- (no CPE)range: < 4.12.4_48-3.109.1
- (no CPE)range: < 4.13.5_12-150200.3.93.1
- (no CPE)range: < 4.12.4_48-3.109.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.