[CVE-2011-4347] kvm device assignment permissions checks

Andy Whitcroft apw at canonical.com
Tue Feb 28 15:11:49 UTC 2012


CVE-2011-4347
	It was found that kvm_vm_ioctl_assign_device function did not check
	if the user requesting assignment was privileged or not. Together
	with /dev/kvm being 666, unprivileged user could assign unused
	pci devices, or even devices that were in use and whose resources
	were not properly claimed by the respective drivers.  Please note
	that privileged access was still needed to re-program the device
	to for example issue DMA requests. This is typically achieved by
	touching files on sysfs filesystem. These files are usually not
	accessible to unprivileged users.  As a result, local user could
	use this flaw to crash the system.

Following this email are two patches.  The first is for lucid and is a
backport from the upstream commit following the code back to an older
filename.  The second is for maverick, natty, and oneiric and is also a
minor backport from the upstream commit, dropping the documentation
updates for the older releases.

Proposing for lucid, maverick, natty and oneiric.

-apw




More information about the kernel-team mailing list