CVE-2012-5525
http://xenbits.xen.org/xsa/advisory-32.html
several hypercalls do not validate input GFNs
The function get_page_from_gfn does not validate its input GFN. An invalid GFN passed to a hypercall which uses this function will cause the hypervisor to read off the end of the frame table and potentially crash.
lack of check (input GFN)
http://xenbits.xen.org/xsa/xsa32-4.2.patch
x86: get_page_from_gfn() must return NULL for invalid GFNs
--- a/xen/include/asm-x86/p2m.h
+++ b/xen/include/asm-x86/p2m.h
@@ -400,7 +400,7 @@ static inline struct page_info *get_page_from_gfn(
if (t)
*t = p2m_ram_rw;
page = __mfn_to_page(gfn);
- return get_page(page, d) ? page : NULL;
+ return mfn_valid(gfn) && get_page(page, d) ? page : NULL;
}
A malicious guest administrator of a PV guest can cause Xen to crash.
DoS