From xen-announce-bounces@lists.xen.org Mon Mar 24 13:02:50 2014
Return-path: <xen-announce-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 24 Mar 2014 13:02:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-announce-bounces@lists.xen.org>)
	id 1WS4VD-0004ZW-9U; Mon, 24 Mar 2014 13:01:19 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WS4VB-0004ZK-64; Mon, 24 Mar 2014 13:01:17 +0000
Received: from [85.158.139.211:38919] by server-15.bemta-5.messagelabs.com id
	CE/4F-11079-C9C20335; Mon, 24 Mar 2014 13:01:16 +0000
X-Env-Sender: iwj@xenbits.xen.org
X-Msg-Ref: server-5.tower-206.messagelabs.com!1395666073!36414!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.11.1; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 9864 invoked from network); 24 Mar 2014 13:01:14 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-5.tower-206.messagelabs.com with AES256-SHA encrypted SMTP;
	24 Mar 2014 13:01:14 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WS4V3-0002tY-Vp; Mon, 24 Mar 2014 13:01:09 +0000
Received: from iwj by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WS4V3-0001Xh-Se; Mon, 24 Mar 2014 13:01:09 +0000
Date: Mon, 24 Mar 2014 13:01:09 +0000
Message-Id: <E1WS4V3-0001Xh-Se@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-announce] Xen Security Advisory 90 - Linux netback crash
 trying to disable due to malformed packet
X-BeenThere: xen-announce@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: "Xen announcements \(low volume\)" <xen-announce.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-announce>, 
	<mailto:xen-announce-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-announce@lists.xen.org>
List-Help: <mailto:xen-announce-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-announce>, 
	<mailto:xen-announce-request@lists.xen.org?subject=subscribe>
Sender: xen-announce-bounces@lists.xen.org
Errors-To: xen-announce-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                    Xen Security Advisory XSA-90

      Linux netback crash trying to disable due to malformed packet

ISSUE DESCRIPTION
=================

When Linux's netback sees a malformed packet, it tries to disable the
interface which serves the misbehaving frontend.

This involves taking a mutex, which might sleep.  But in recent
versions of Linux the guest transmit path is handled by NAPI in
softirq context, where sleeping is not allowed.  The end result is
that the backend domain (often, Dom0) crashes with "scheduling while
atomic".

IMPACT
======

Malicious guest administrators can cause denial of service.  If driver
domains are not in use, the impact is a host crash.

VULNERABLE SYSTEMS
==================

This bug affects systems using Linux as the driver domain, including
non-disaggregated systems using Linux as dom0.

Only versions of Linux whose netback uses NAPI are affected.  In Linux
mainline this is all versions of Linux containing git changeset
b3f980bd82, which was introduced between Linux 3.11 and 3.12-rc1.

Systems using a different OS as dom0 (eg, NetBSD, Solaris) are not
vulnerable.

Both x86 and ARM systems are affected.

MITIGATION
==========

Using driver domains may limit the scope of the denial of service, and
may make it possible to resume service without restarting guests (by
restarting the driver domain).  Advice on reconfiguring a system to
use driver domains is beyond the reasonable scope of this advisory.

In the case of an x86 HVM guest, the exploit can be prevented by
disabling the PV IO paths; normally this would come with a substantial
performance cost, and it may involve reconfiguring the guest as well
as the host.  This is not recommended.

NOTE REGARDING LACK OF EMBARGO
==============================

This bug was publicly reported on xen-devel, before it was appreciated
that there was a security problem.  The public mailing list thread
nevertheless contains information strongly suggestive of a security
bug, and a different security bug (with CVE) is suggested as seeming
"similar".

For these reasons we (the Xen Project Security Team) have concluded
that the presence of this bug, as a security problem, is not (any
longer) a secret.

CREDITS
=======

This issue was discovered as a bug by Török Edwin and analysed by
Wei Liu of Citrix.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

$ sha256sum xsa90*.patch
07341ffb7f577d32510602797a08009eade817009b425a124413ee743bdb6f05  xsa90.patch
$
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTMCxRAAoJEIP+FMlX6CvZaAEIAIIVfNdz3CwFYbiSwa51RJ3L
YFarP71/0EjNJKSaRwf6EQjDNnApqq6ep4+WKFvlMbm515jyQXp6mAbb8ffqnLUQ
2SDOlQXOpbnZrJrgo4YcT5ru8ZusauYz36TkFVcXBmcKWq29KoUARo5zG7YGyh9H
aWajaZs6RQPv3QE8IInNSP0oitRQZg/5xAW+Lz4Kn8xpO/IJuYW3ROH6JQcFF67H
r7xVAzxjrNQ3P5mN0iiOkQYK39PqhwGUhWaa6JlejsjUgU1nsGIBOHH+ISCaZrtL
e/6XK3awaDiu1dAL4Py1SdhPiA0sTeqA3bf6ARd7ymoIFqGuxrqYlupcUKTupjE=
=LrLN
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa90.patch"
Content-Disposition: attachment; filename="xsa90.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-announce mailing list
Xen-announce@lists.xen.org
http://lists.xen.org/xen-announce
--=separator--


From xen-announce-bounces@lists.xen.org Mon Mar 24 13:02:50 2014
Return-path: <xen-announce-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Mon, 24 Mar 2014 13:02:50 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-announce-bounces@lists.xen.org>)
	id 1WS4VD-0004ZW-9U; Mon, 24 Mar 2014 13:01:19 +0000
Received: from mail6.bemta5.messagelabs.com ([195.245.231.135])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WS4VB-0004ZK-64; Mon, 24 Mar 2014 13:01:17 +0000
Received: from [85.158.139.211:38919] by server-15.bemta-5.messagelabs.com id
	CE/4F-11079-C9C20335; Mon, 24 Mar 2014 13:01:16 +0000
X-Env-Sender: iwj@xenbits.xen.org
X-Msg-Ref: server-5.tower-206.messagelabs.com!1395666073!36414!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.5 required=7.0 tests=BODY_RANDOM_LONG
X-StarScan-Received: 
X-StarScan-Version: 6.11.1; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 9864 invoked from network); 24 Mar 2014 13:01:14 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-5.tower-206.messagelabs.com with AES256-SHA encrypted SMTP;
	24 Mar 2014 13:01:14 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WS4V3-0002tY-Vp; Mon, 24 Mar 2014 13:01:09 +0000
Received: from iwj by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WS4V3-0001Xh-Se; Mon, 24 Mar 2014 13:01:09 +0000
Date: Mon, 24 Mar 2014 13:01:09 +0000
Message-Id: <E1WS4V3-0001Xh-Se@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-announce] Xen Security Advisory 90 - Linux netback crash
 trying to disable due to malformed packet
X-BeenThere: xen-announce@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: "Xen announcements \(low volume\)" <xen-announce.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-announce>, 
	<mailto:xen-announce-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-announce@lists.xen.org>
List-Help: <mailto:xen-announce-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-announce>, 
	<mailto:xen-announce-request@lists.xen.org?subject=subscribe>
Sender: xen-announce-bounces@lists.xen.org
Errors-To: xen-announce-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                    Xen Security Advisory XSA-90

      Linux netback crash trying to disable due to malformed packet

ISSUE DESCRIPTION
=================

When Linux's netback sees a malformed packet, it tries to disable the
interface which serves the misbehaving frontend.

This involves taking a mutex, which might sleep.  But in recent
versions of Linux the guest transmit path is handled by NAPI in
softirq context, where sleeping is not allowed.  The end result is
that the backend domain (often, Dom0) crashes with "scheduling while
atomic".

IMPACT
======

Malicious guest administrators can cause denial of service.  If driver
domains are not in use, the impact is a host crash.

VULNERABLE SYSTEMS
==================

This bug affects systems using Linux as the driver domain, including
non-disaggregated systems using Linux as dom0.

Only versions of Linux whose netback uses NAPI are affected.  In Linux
mainline this is all versions of Linux containing git changeset
b3f980bd82, which was introduced between Linux 3.11 and 3.12-rc1.

Systems using a different OS as dom0 (eg, NetBSD, Solaris) are not
vulnerable.

Both x86 and ARM systems are affected.

MITIGATION
==========

Using driver domains may limit the scope of the denial of service, and
may make it possible to resume service without restarting guests (by
restarting the driver domain).  Advice on reconfiguring a system to
use driver domains is beyond the reasonable scope of this advisory.

In the case of an x86 HVM guest, the exploit can be prevented by
disabling the PV IO paths; normally this would come with a substantial
performance cost, and it may involve reconfiguring the guest as well
as the host.  This is not recommended.

NOTE REGARDING LACK OF EMBARGO
==============================

This bug was publicly reported on xen-devel, before it was appreciated
that there was a security problem.  The public mailing list thread
nevertheless contains information strongly suggestive of a security
bug, and a different security bug (with CVE) is suggested as seeming
"similar".

For these reasons we (the Xen Project Security Team) have concluded
that the presence of this bug, as a security problem, is not (any
longer) a secret.

CREDITS
=======

This issue was discovered as a bug by Török Edwin and analysed by
Wei Liu of Citrix.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

$ sha256sum xsa90*.patch
07341ffb7f577d32510602797a08009eade817009b425a124413ee743bdb6f05  xsa90.patch
$
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTMCxRAAoJEIP+FMlX6CvZaAEIAIIVfNdz3CwFYbiSwa51RJ3L
YFarP71/0EjNJKSaRwf6EQjDNnApqq6ep4+WKFvlMbm515jyQXp6mAbb8ffqnLUQ
2SDOlQXOpbnZrJrgo4YcT5ru8ZusauYz36TkFVcXBmcKWq29KoUARo5zG7YGyh9H
aWajaZs6RQPv3QE8IInNSP0oitRQZg/5xAW+Lz4Kn8xpO/IJuYW3ROH6JQcFF67H
r7xVAzxjrNQ3P5mN0iiOkQYK39PqhwGUhWaa6JlejsjUgU1nsGIBOHH+ISCaZrtL
e/6XK3awaDiu1dAL4Py1SdhPiA0sTeqA3bf6ARd7ymoIFqGuxrqYlupcUKTupjE=
=LrLN
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa90.patch"
Content-Disposition: attachment; filename="xsa90.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-announce mailing list
Xen-announce@lists.xen.org
http://lists.xen.org/xen-announce
--=separator--


From xen-announce-bounces@lists.xen.org Tue Mar 25 12:15:25 2014
Return-path: <xen-announce-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 25 Mar 2014 12:15:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-announce-bounces@lists.xen.org>)
	id 1WSQEx-0001Hv-8B; Tue, 25 Mar 2014 12:13:59 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WSQEv-0001HU-Vo; Tue, 25 Mar 2014 12:13:58 +0000
Received: from [193.109.254.147:14716] by server-5.bemta-14.messagelabs.com id
	96/40-26413-50371335; Tue, 25 Mar 2014 12:13:57 +0000
X-Env-Sender: iwj@xenbits.xen.org
X-Msg-Ref: server-11.tower-27.messagelabs.com!1395749635!3939073!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.11.1; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29505 invoked from network); 25 Mar 2014 12:13:56 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-11.tower-27.messagelabs.com with AES256-SHA encrypted SMTP;
	25 Mar 2014 12:13:56 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WSQEn-0007J0-P0; Tue, 25 Mar 2014 12:13:49 +0000
Received: from iwj by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WSQEn-0000fB-Ad; Tue, 25 Mar 2014 12:13:49 +0000
Date: Tue, 25 Mar 2014 12:13:49 +0000
Message-Id: <E1WSQEn-0000fB-Ad@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-announce] Xen Security Advisory 89 - HVMOP_set_mem_access is
	not preemptible
X-BeenThere: xen-announce@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: "Xen announcements \(low volume\)" <xen-announce.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-announce>, 
	<mailto:xen-announce-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-announce@lists.xen.org>
List-Help: <mailto:xen-announce-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-announce>, 
	<mailto:xen-announce-request@lists.xen.org?subject=subscribe>
Sender: xen-announce-bounces@lists.xen.org
Errors-To: xen-announce-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                    Xen Security Advisory XSA-89
                             version 2

              HVMOP_set_mem_access is not preemptible

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

Processing of the HVMOP_set_mem_access HVM control operations does not
check the size of its input and can tie up a physical CPU for extended
periods of time.

IMPACT
======

In a configuration where device models run with limited privilege (for
example, stubdom device models), a guest attacker who successfully
finds and exploits an unfixed security flaw in qemu-dm could leverage
the other flaw into a Denial of Service affecting the whole host.

In the more general case, in more abstract terms: a malicious
administrator of a domain privileged with regard to an HVM guest can
cause Xen to become unresponsive leading to a Denial of Service.

VULNERABLE SYSTEMS
==================

All Xen versions from 4.1 onwards are vulnerable. In 4.2 only 64-bit
versions of the hypervisor are vulnerable (HVMOP_set_mem_access is not
available in 32-bit hypervisors).

The vulnerability is only exposed to service domains for HVM guests
which have privilege over the guest.  In a usual configuration that
means only device model emulators (qemu-dm).

In the case of HVM guests whose device model is running in an
unrestricted dom0 process, qemu-dm already has the ability to cause
problems for the whole system.  So in that case the vulnerability is
not applicable.

The situation is more subtle for an HVM guest with a stub qemu-dm.
That is, where the device model runs in a separate domain (in the case
of xl, as requested by "device_model_stubdomain_override=1" in the xl
domain configuration file).  The same applies with a qemu-dm in a dom0
process subjected to some kind kernel-based process privilege
limitation (eg the chroot technique as found in some versions of
XCP/XenServer).

In those latter situations this issue means that the extra isolation
does not provide as good a defence (against denial of service) as
intended.  That is the essence of this vulnerability.

However, the security is still better than with a qemu-dm running as
an unrestricted dom0 process.  Therefore users with these
configurations should not switch to an unrestricted dom0 qemu-dm.

Finally, in a radically disaggregated system: where the HVM service
domain software (probably, the device model domain image) is not
always supplied by the host administrator, a malicious service domain
administrator can excercise this vulnerability.

MITIGATION
==========

Running only PV guests will avoid this vulnerability.

In a radically disaggregated system, restricting HVM service domains
to software images approved by the host administrator will avoid the
vulnerability.

CREDITS
=======

This issue was discovered by Jan Beulich.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa89.patch        xen-unstable, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x
xsa89-4.1.patch    Xen 4.1.x

$ sha256sum xsa89*.patch
741c8fbbfa8e425d8debba17135d4c2e1e962d15717769bc93d68a65b5dc5ea6  xsa89.patch
7d965e9bf1894b7d909bfaddbc6b7bdcee0ba91b86942ce85e0ae80464f2463e  xsa89-4.1.patch
$
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTMXLgAAoJEIP+FMlX6CvZZ78H/RbnQJwEHxKxn3zhaEULpm57
zBPG1D2cGP12UCkFQLqR8tWvPYmEtm3/x/FQHjzTCBBCM3GMFJ9BiKOX+u5+h2Bu
17xPD3K8cH1tBkZpnQTkTBTz7XrfwV+C78kaNxo3TBvlgTIljaGCHxkXt0PmR1Vq
DPZEQdYXj/v8pblmyHYuhd6zf3n6V07ABLqHyPc9n6yZ4/o2LFjqQPZJpYFiFZI+
NGPw18+WCYlXc9w9ZtpGlNOo7Y5O2lraLLu7Gyi+JjC/BHXnb1XLgmgOSTyj2X5M
5v6zIMXy3vqaXHyjqw7uX6EzhCPfPhXAXVjpVGDin+RY/Ykp0QBDweUxZb4U71U=
=u+aG
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa89.patch"
Content-Disposition: attachment; filename="xsa89.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: application/octet-stream; name="xsa89-4.1.patch"
Content-Disposition: attachment; filename="xsa89-4.1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-announce mailing list
Xen-announce@lists.xen.org
http://lists.xen.org/xen-announce
--=separator--


From xen-announce-bounces@lists.xen.org Tue Mar 25 12:15:25 2014
Return-path: <xen-announce-bounces@lists.xen.org>
Envelope-to: archives@lists.xen.org
Delivery-date: Tue, 25 Mar 2014 12:15:25 +0000
Received: from localhost ([127.0.0.1] helo=lists.xen.org)
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <xen-announce-bounces@lists.xen.org>)
	id 1WSQEx-0001Hv-8B; Tue, 25 Mar 2014 12:13:59 +0000
Received: from mail6.bemta14.messagelabs.com ([193.109.254.103])
	by lists.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WSQEv-0001HU-Vo; Tue, 25 Mar 2014 12:13:58 +0000
Received: from [193.109.254.147:14716] by server-5.bemta-14.messagelabs.com id
	96/40-26413-50371335; Tue, 25 Mar 2014 12:13:57 +0000
X-Env-Sender: iwj@xenbits.xen.org
X-Msg-Ref: server-11.tower-27.messagelabs.com!1395749635!3939073!1
X-Originating-IP: [50.57.168.107]
X-SpamReason: No, hits=0.0 required=7.0 tests=
X-StarScan-Received: 
X-StarScan-Version: 6.11.1; banners=-,-,-
X-VirusChecked: Checked
Received: (qmail 29505 invoked from network); 25 Mar 2014 12:13:56 -0000
Received: from mail.xen.org (HELO mail.xen.org) (50.57.168.107)
	by server-11.tower-27.messagelabs.com with AES256-SHA encrypted SMTP;
	25 Mar 2014 12:13:56 -0000
Received: from xenbits.xen.org ([50.57.170.242])
	by mail.xen.org with esmtp (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WSQEn-0007J0-P0; Tue, 25 Mar 2014 12:13:49 +0000
Received: from iwj by xenbits.xen.org with local (Exim 4.72)
	(envelope-from <iwj@xenbits.xen.org>)
	id 1WSQEn-0000fB-Ad; Tue, 25 Mar 2014 12:13:49 +0000
Date: Tue, 25 Mar 2014 12:13:49 +0000
Message-Id: <E1WSQEn-0000fB-Ad@xenbits.xen.org>
Content-Type: multipart/mixed; boundary="=separator"; charset="utf-8"
Content-Transfer-Encoding: binary
MIME-Version: 1.0
X-Mailer: MIME-tools 5.428 (Entity 5.428)
To: xen-announce@lists.xen.org, xen-devel@lists.xen.org,
	xen-users@lists.xen.org, oss-security@lists.openwall.com
From: Xen.org security team <security@xen.org>
Cc: "Xen.org security team" <security@xen.org>
Subject: [Xen-announce] Xen Security Advisory 89 - HVMOP_set_mem_access is
	not preemptible
X-BeenThere: xen-announce@lists.xen.org
X-Mailman-Version: 2.1.13
Precedence: list
List-Id: "Xen announcements \(low volume\)" <xen-announce.lists.xen.org>
List-Unsubscribe: <http://lists.xen.org/cgi-bin/mailman/options/xen-announce>, 
	<mailto:xen-announce-request@lists.xen.org?subject=unsubscribe>
List-Post: <mailto:xen-announce@lists.xen.org>
List-Help: <mailto:xen-announce-request@lists.xen.org?subject=help>
List-Subscribe: <http://lists.xen.org/cgi-bin/mailman/listinfo/xen-announce>, 
	<mailto:xen-announce-request@lists.xen.org?subject=subscribe>
Sender: xen-announce-bounces@lists.xen.org
Errors-To: xen-announce-bounces@lists.xen.org


--=separator
Content-Type: text/plain; charset="utf-8"
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

                    Xen Security Advisory XSA-89
                             version 2

              HVMOP_set_mem_access is not preemptible

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

Processing of the HVMOP_set_mem_access HVM control operations does not
check the size of its input and can tie up a physical CPU for extended
periods of time.

IMPACT
======

In a configuration where device models run with limited privilege (for
example, stubdom device models), a guest attacker who successfully
finds and exploits an unfixed security flaw in qemu-dm could leverage
the other flaw into a Denial of Service affecting the whole host.

In the more general case, in more abstract terms: a malicious
administrator of a domain privileged with regard to an HVM guest can
cause Xen to become unresponsive leading to a Denial of Service.

VULNERABLE SYSTEMS
==================

All Xen versions from 4.1 onwards are vulnerable. In 4.2 only 64-bit
versions of the hypervisor are vulnerable (HVMOP_set_mem_access is not
available in 32-bit hypervisors).

The vulnerability is only exposed to service domains for HVM guests
which have privilege over the guest.  In a usual configuration that
means only device model emulators (qemu-dm).

In the case of HVM guests whose device model is running in an
unrestricted dom0 process, qemu-dm already has the ability to cause
problems for the whole system.  So in that case the vulnerability is
not applicable.

The situation is more subtle for an HVM guest with a stub qemu-dm.
That is, where the device model runs in a separate domain (in the case
of xl, as requested by "device_model_stubdomain_override=1" in the xl
domain configuration file).  The same applies with a qemu-dm in a dom0
process subjected to some kind kernel-based process privilege
limitation (eg the chroot technique as found in some versions of
XCP/XenServer).

In those latter situations this issue means that the extra isolation
does not provide as good a defence (against denial of service) as
intended.  That is the essence of this vulnerability.

However, the security is still better than with a qemu-dm running as
an unrestricted dom0 process.  Therefore users with these
configurations should not switch to an unrestricted dom0 qemu-dm.

Finally, in a radically disaggregated system: where the HVM service
domain software (probably, the device model domain image) is not
always supplied by the host administrator, a malicious service domain
administrator can excercise this vulnerability.

MITIGATION
==========

Running only PV guests will avoid this vulnerability.

In a radically disaggregated system, restricting HVM service domains
to software images approved by the host administrator will avoid the
vulnerability.

CREDITS
=======

This issue was discovered by Jan Beulich.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa89.patch        xen-unstable, Xen 4.4.x, Xen 4.3.x, Xen 4.2.x
xsa89-4.1.patch    Xen 4.1.x

$ sha256sum xsa89*.patch
741c8fbbfa8e425d8debba17135d4c2e1e962d15717769bc93d68a65b5dc5ea6  xsa89.patch
7d965e9bf1894b7d909bfaddbc6b7bdcee0ba91b86942ce85e0ae80464f2463e  xsa89-4.1.patch
$
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iQEcBAEBAgAGBQJTMXLgAAoJEIP+FMlX6CvZZ78H/RbnQJwEHxKxn3zhaEULpm57
zBPG1D2cGP12UCkFQLqR8tWvPYmEtm3/x/FQHjzTCBBCM3GMFJ9BiKOX+u5+h2Bu
17xPD3K8cH1tBkZpnQTkTBTz7XrfwV+C78kaNxo3TBvlgTIljaGCHxkXt0PmR1Vq
DPZEQdYXj/v8pblmyHYuhd6zf3n6V07ABLqHyPc9n6yZ4/o2LFjqQPZJpYFiFZI+
NGPw18+WCYlXc9w9ZtpGlNOo7Y5O2lraLLu7Gyi+JjC/BHXnb1XLgmgOSTyj2X5M
5v6zIMXy3vqaXHyjqw7uX6EzhCPfPhXAXVjpVGDin+RY/Ykp0QBDweUxZb4U71U=
=u+aG
-----END PGP SIGNATURE-----

--=separator
Content-Type: application/octet-stream; name="xsa89.patch"
Content-Disposition: attachment; filename="xsa89.patch"
Content-Transfer-Encoding: base64

eDg2OiBlbmZvcmNlIHByZWVtcHRpb24gaW4gSFZNX3NldF9tZW1fYWNjZXNz
IC8gcDJtX3NldF9tZW1fYWNjZXNzKCkKClByb2Nlc3NpbmcgdXAgdG8gNEcg
UEZOcyBtYXkgdGFrZSBhbG1vc3QgYXJiaXRyYXJpbHkgbG9uZywgc28KcHJl
ZW1wdGlvbiBpcyBuZWVkZWQgaGVyZS4KClRoaXMgaXMgWFNBLTg5LgoKU2ln
bmVkLW9mZi1ieTogSmFuIEJldWxpY2ggPGpiZXVsaWNoQHN1c2UuY29tPgpS
ZXZpZXdlZC1ieTogVGltIERlZWdhbiA8dGltQHhlbi5vcmc+CgotLS0gYS94
ZW4vYXJjaC94ODYvaHZtL2h2bS5jCisrKyBiL3hlbi9hcmNoL3g4Ni9odm0v
aHZtLmMKQEAgLTQ1OTMsNiArNDU5MywxNSBAQCBsb25nIGRvX2h2bV9vcCh1
bnNpZ25lZCBsb25nIG9wLCBYRU5fR1VFCiAgICAgICAgICAgICBnb3RvIHBh
cmFtX2ZhaWw1OwogICAgICAgICAgICAgCiAgICAgICAgIHJjID0gcDJtX3Nl
dF9tZW1fYWNjZXNzKGQsIGEuZmlyc3RfcGZuLCBhLm5yLCBhLmh2bW1lbV9h
Y2Nlc3MpOworICAgICAgICBpZiAoIHJjID4gMCApCisgICAgICAgIHsKKyAg
ICAgICAgICAgIGEuZmlyc3RfcGZuICs9IGEubnIgLSByYzsKKyAgICAgICAg
ICAgIGEubnIgPSByYzsKKyAgICAgICAgICAgIGlmICggX19jb3B5X3RvX2d1
ZXN0KGFyZywgJmEsIDEpICkKKyAgICAgICAgICAgICAgICByYyA9IC1FRkFV
TFQ7CisgICAgICAgICAgICBlbHNlCisgICAgICAgICAgICAgICAgcmMgPSAt
RUFHQUlOOworICAgICAgICB9CiAKICAgICBwYXJhbV9mYWlsNToKICAgICAg
ICAgcmN1X3VubG9ja19kb21haW4oZCk7Ci0tLSBhL3hlbi9hcmNoL3g4Ni9t
bS9wMm0uYworKysgYi94ZW4vYXJjaC94ODYvbW0vcDJtLmMKQEAgLTEzMzMs
MTUgKzEzMzMsMTQgQEAgdm9pZCBwMm1fbWVtX2FjY2Vzc19yZXN1bWUoc3Ry
dWN0IGRvbWFpbgogCiAvKiBTZXQgYWNjZXNzIHR5cGUgZm9yIGEgcmVnaW9u
IG9mIHBmbnMuCiAgKiBJZiBzdGFydF9wZm4gPT0gLTF1bCwgc2V0cyB0aGUg
ZGVmYXVsdCBhY2Nlc3MgdHlwZSAqLwotaW50IHAybV9zZXRfbWVtX2FjY2Vz
cyhzdHJ1Y3QgZG9tYWluICpkLCB1bnNpZ25lZCBsb25nIHN0YXJ0X3Bmbiwg
Ci0gICAgICAgICAgICAgICAgICAgICAgIHVpbnQzMl90IG5yLCBodm1tZW1f
YWNjZXNzX3QgYWNjZXNzKSAKK2xvbmcgcDJtX3NldF9tZW1fYWNjZXNzKHN0
cnVjdCBkb21haW4gKmQsIHVuc2lnbmVkIGxvbmcgcGZuLCB1aW50MzJfdCBu
ciwKKyAgICAgICAgICAgICAgICAgICAgICAgIGh2bW1lbV9hY2Nlc3NfdCBh
Y2Nlc3MpCiB7CiAgICAgc3RydWN0IHAybV9kb21haW4gKnAybSA9IHAybV9n
ZXRfaG9zdHAybShkKTsKLSAgICB1bnNpZ25lZCBsb25nIHBmbjsKICAgICBw
Mm1fYWNjZXNzX3QgYSwgX2E7CiAgICAgcDJtX3R5cGVfdCB0OwogICAgIG1m
bl90IG1mbjsKLSAgICBpbnQgcmMgPSAwOworICAgIGxvbmcgcmM7CiAKICAg
ICAvKiBOLkIuIF9ub3RfIHN0YXRpYzogaW5pdGlhbGl6ZXIgZGVwZW5kcyBv
biBwMm0tPmRlZmF1bHRfYWNjZXNzICovCiAgICAgcDJtX2FjY2Vzc190IG1l
bWFjY2Vzc1tdID0gewpAQCAtMTM2NCwxNCArMTM2MywxNyBAQCBpbnQgcDJt
X3NldF9tZW1fYWNjZXNzKHN0cnVjdCBkb21haW4gKmQsCiAgICAgYSA9IG1l
bWFjY2Vzc1thY2Nlc3NdOwogCiAgICAgLyogSWYgcmVxdWVzdCB0byBzZXQg
ZGVmYXVsdCBhY2Nlc3MgKi8KLSAgICBpZiAoIHN0YXJ0X3BmbiA9PSB+MHVs
bCApIAorICAgIGlmICggcGZuID09IH4wdWwgKQogICAgIHsKICAgICAgICAg
cDJtLT5kZWZhdWx0X2FjY2VzcyA9IGE7CiAgICAgICAgIHJldHVybiAwOwog
ICAgIH0KIAorICAgIGlmICggIW5yICkKKyAgICAgICAgcmV0dXJuIDA7CisK
ICAgICBwMm1fbG9jayhwMm0pOwotICAgIGZvciAoIHBmbiA9IHN0YXJ0X3Bm
bjsgcGZuIDwgc3RhcnRfcGZuICsgbnI7IHBmbisrICkKKyAgICBmb3IgKCA7
IDsgKytwZm4gKQogICAgIHsKICAgICAgICAgbWZuID0gcDJtLT5nZXRfZW50
cnkocDJtLCBwZm4sICZ0LCAmX2EsIDAsIE5VTEwpOwogICAgICAgICBpZiAo
IHAybS0+c2V0X2VudHJ5KHAybSwgcGZuLCBtZm4sIFBBR0VfT1JERVJfNEss
IHQsIGEpID09IDAgKQpAQCAtMTM3OSw2ICsxMzgxLDEzIEBAIGludCBwMm1f
c2V0X21lbV9hY2Nlc3Moc3RydWN0IGRvbWFpbiAqZCwKICAgICAgICAgICAg
IHJjID0gLUVOT01FTTsKICAgICAgICAgICAgIGJyZWFrOwogICAgICAgICB9
CisKKyAgICAgICAgLyogQ2hlY2sgZm9yIGNvbnRpbnVhdGlvbiBpZiBpdCdz
IG5vdCB0aGUgbGFzdCBpbnRlcmF0aW9uLiAqLworICAgICAgICBpZiAoICEt
LW5yIHx8IGh5cGVyY2FsbF9wcmVlbXB0X2NoZWNrKCkgKQorICAgICAgICB7
CisgICAgICAgICAgICByYyA9IG5yOworICAgICAgICAgICAgYnJlYWs7Cisg
ICAgICAgIH0KICAgICB9CiAgICAgcDJtX3VubG9jayhwMm0pOwogICAgIHJl
dHVybiByYzsKLS0tIGEveGVuL2luY2x1ZGUvYXNtLXg4Ni9wMm0uaAorKysg
Yi94ZW4vaW5jbHVkZS9hc20teDg2L3AybS5oCkBAIC01NzYsOCArNTc2LDgg
QEAgdm9pZCBwMm1fbWVtX2FjY2Vzc19yZXN1bWUoc3RydWN0IGRvbWFpbgog
CiAvKiBTZXQgYWNjZXNzIHR5cGUgZm9yIGEgcmVnaW9uIG9mIHBmbnMuCiAg
KiBJZiBzdGFydF9wZm4gPT0gLTF1bCwgc2V0cyB0aGUgZGVmYXVsdCBhY2Nl
c3MgdHlwZSAqLwotaW50IHAybV9zZXRfbWVtX2FjY2VzcyhzdHJ1Y3QgZG9t
YWluICpkLCB1bnNpZ25lZCBsb25nIHN0YXJ0X3BmbiwgCi0gICAgICAgICAg
ICAgICAgICAgICAgIHVpbnQzMl90IG5yLCBodm1tZW1fYWNjZXNzX3QgYWNj
ZXNzKTsKK2xvbmcgcDJtX3NldF9tZW1fYWNjZXNzKHN0cnVjdCBkb21haW4g
KmQsIHVuc2lnbmVkIGxvbmcgc3RhcnRfcGZuLAorICAgICAgICAgICAgICAg
ICAgICAgICAgdWludDMyX3QgbnIsIGh2bW1lbV9hY2Nlc3NfdCBhY2Nlc3Mp
OwogCiAvKiBHZXQgYWNjZXNzIHR5cGUgZm9yIGEgcGZuCiAgKiBJZiBwZm4g
PT0gLTF1bCwgZ2V0cyB0aGUgZGVmYXVsdCBhY2Nlc3MgdHlwZSAqLwo=

--=separator
Content-Type: application/octet-stream; name="xsa89-4.1.patch"
Content-Disposition: attachment; filename="xsa89-4.1.patch"
Content-Transfer-Encoding: base64
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--=separator
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Xen-announce mailing list
Xen-announce@lists.xen.org
http://lists.xen.org/xen-announce
--=separator--


