CVE-2019-18425

Priority
Description
An issue was discovered in Xen through 4.12.x allowing 32-bit PV guest OS
users to gain guest OS privileges by installing and using descriptors.
There is missing descriptor table limit checking in x86 PV emulation. When
emulating certain PV guest operations, descriptor table accesses are
performed by the emulating code. Such accesses should respect the guest
specified limits, unless otherwise guaranteed to fail in such a case.
Without this, emulation of 32-bit guest user mode calls through call gates
would allow guest user mode to install and then use descriptors of their
choice, as long as the guest kernel did not itself install an LDT. (Most
OSes don't install any LDT by default). 32-bit PV guest user mode can
elevate its privileges to that of the guest kernel. Xen versions from at
least 3.2 onwards are affected. Only 32-bit PV guest user mode can leverage
this vulnerability. HVM, PVH, as well as 64-bit PV guests cannot leverage
this vulnerability. Arm systems are unaffected.
Notes
mdeslaurhypervisor packages are in universe. For
issues in the hypervisor, add appropriate
tags to each section, ex:
Tags_xen: universe-binary
Package
Source: xen (LP Ubuntu Debian)
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 20.04 LTS (Focal Fossa):not-affected (4.11.3+24-g14b62ab3e5-1ubuntu1)
Ubuntu 20.10 (Groovy Gorilla):not-affected (4.11.3+24-g14b62ab3e5-1ubuntu1)
Binaries built from this source package are in universe and so are supported by the community. For more details see https://wiki.ubuntu.com/SecurityTeam/FAQ#Official_Support
More Information

Updated: 2020-10-24 06:57:33 UTC (commit 69e225d81a6ee3e2e014950178db797c5d4e5009)