Unverified Commit a8cdacff authored by Fernando Rodrigues's avatar Fernando Rodrigues
Browse files

xen: patch with XSA-480



            Xen Security Advisory CVE-2026-23554 / XSA-480
                               version 3

              Use after free of paging structures in EPT

The Intel EPT paging code uses an optimization to defer flushing of any cached
EPT state until the p2m lock is dropped, so that multiple modifications done
under the same locked region only issue a single flush.

Freeing of paging structures however is not deferred until the flushing is
done, and can result in freed pages transiently being present in cached state.
Such stale entries can point to memory ranges not owned by the guest, thus
allowing access to unintended memory regions.

Privilege escalation, Denial of Service (DoS) affecting the entire host,
and information leaks are possible impacts of this vulnerability.

Signed-off-by: default avatarFernando Rodrigues <alpha@sigmasquadron.net>
parent cee3d0e8
Loading
Loading
Loading
Loading
+6 −0
Original line number Diff line number Diff line
@@ -198,6 +198,12 @@ stdenv.mkDerivation (finalAttrs: {
      hash = "sha256-2o6RYyT4Nrg1le6BUOQ3AwedorCvxvKao2uMYWrUV1Y=";
    })

    # XSA #480
    (fetchpatch {
      url = "https://xenbits.xenproject.org/xsa/xsa480.patch";
      hash = "sha256-mHoY+Y8klwLYOo4LZCwYcNsB1BcBbSa1nQOn3NueDdI=";
    })

    # patch `libxl` to search for `qemu-system-i386` properly. (Before 4.21)
    (fetchpatch {
      url = "https://github.com/xen-project/xen/commit/f6281291704aa356489f4bd927cc7348a920bd01.diff?full_index=1";