Date: Wed, 1 Sep 2021 09:22:14 -0400 From: Jason Andryuk <jandryuk@...il.com> To: "Xen.org security team" <security@....org> Cc: xen-announce@...ts.xen.org, xen-devel@...ts.xen.org, xen-users@...ts.xen.org, oss-security@...ts.openwall.com, "Xen.org security team" <security-team-members@....org> Subject: Re: Xen Security Advisory 378 v3 (CVE-2021-28694,CVE-2021-28695,CVE-2021-28696) - IOMMU page mapping issues on x86 On Wed, Sep 1, 2021 at 5:34 AM Xen.org security team <security@....org> wrote: > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA256 > > Xen Security Advisory CVE-2021-28694,CVE-2021-28695,CVE-2021-28696 / XSA-378 > version 3 > > IOMMU page mapping issues on x86 > > UPDATES IN VERSION 3 > ==================== > > Warn about dom0=pvh breakage in Resolution section. > > ISSUE DESCRIPTION > ================= > > Both AMD and Intel allow ACPI tables to specify regions of memory > which should be left untranslated, which typically means these > addresses should pass the translation phase unaltered. While these > are typically device specific ACPI properties, they can also be > specified to apply to a range of devices, or even all devices. > > On all systems with such regions Xen failed to prevent guests from > undoing/replacing such mappings (CVE-2021-28694). Hi, Is there a way to identify if a system's ACPI tables have untranslated regions? Does it show up in xen or linux dmesg or can it be identified in sysfs? Thanks, Jason
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.