An issue was discovered in Xen through 4.12.x allowing attackers to gain
host OS privileges via DMA in a situation where an untrusted domain has
access to a physical device. This occurs because passed through PCI devices
may corrupt host memory after deassignment. When a PCI device is assigned
to an untrusted domain, it is possible for that domain to program the
device to DMA to an arbitrary address. The IOMMU is used to protect the
host from malicious DMA by making sure that the device addresses can only
target memory assigned to the guest. However, when the guest domain is torn
down, or the device is deassigned, the device is assigned back to dom0,
thus allowing any in-flight DMA to potentially target critical host data.
An untrusted domain with access to a physical device can DMA into host
memory, leading to privilege escalation. Only systems where guests are
given direct access to physical devices capable of DMA (PCI pass-through)
are vulnerable. Systems which do not use PCI pass-through are not
mdeslaurhypervisor packages are in universe. For
issues in the hypervisor, add appropriate
tags to each section, ex:
Tags_xen: universe-binary
Source: xen (LP Ubuntu Debian)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 20.04 LTS (Focal Fossa):not-affected (4.11.3+24-g14b62ab3e5-1ubuntu1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (4.11.3+24-g14b62ab3e5-1ubuntu1)
Binaries built from this source package are in universe and so are supported by the community. For more details see
More Information

Updated: 2020-10-24 06:57:33 UTC (commit 69e225d81a6ee3e2e014950178db797c5d4e5009)