[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Publicity] Draft technical blog post



On Thu, Oct 02, 2014 at 03:48:30PM +0100, George Dunlap wrote:
> Hey all,
> 
> Below is a more technical draft blog post in response to the recent media
> flurry about XSA-108.  If you've updated your blog logins you can also
> preview the post here: https://blog.xenproject.org/?p=10093&preview=true
> 
> Let me know if you have any feedback!

You might want to add that Linux guests that run in HVM mode don't enable
x2APIC mode at all - as they end up using the PVHVM route which ends up
using events.

This does affect 'true' HVM guests.

> 
>  -George
> 
> XSA-108: Not the disaster you're looking for
> 
> There has an unusual amount of media attention to XSA-108, whose embargo
> period ended Wednesday -- far more than any of the previous 107
> vulnerabilities the Xen Project has reported.  It began when a blogger
> noticed that Amazon was telling customers it would be rebooting VMs in
> certain regions before a specific date -- a date which happened to coincide
> with the release of XSA-108.  He conjectured that the reboots had something
> to do with that, and further conjectured that, because of the major impact
> to customers of rebooting, that it must be something very big and important,
> similar to the recent Heartbleed and Shell Shock vulnerabilities. Amazon
> confirmed that the reboots had to do with XSA-108, but could say nothing
> else because of the security embargo.
> 
> Unfortunately, because of the nature of embargoes, nobody with any actual
> knowledge of the vulnerability was allowed to say anything about it, and so
> the media was entirely free to speculate without any actual facts getting in
> the way.
> 
> Now that the embargo has lifted, we can talk in detail about the
> vulnerability; and I'm afraid that people looking for another Shell Shock or
> Heartbleed are going to be disappointed.
> 
> <h1>What is the vulnerability?</h1>
> 
> XSA-108 has to do with the emulation of a piece of hardware called an
> x2apic.  x2apic is an interrupt controller: it allows the operating system

x2APIC 

> to control when and how and where urgent messages from outside the chip, and
> from other cores within the same chip, are delivered.
> 
> Interrupt controllers occupy a rather awkward position in the architecture.
> They are fairly complicated to implement in hardware; which is why they are
> not yet implemented by Intel's VT hardware. (This may change in the future.)
> But they are far too performance critical for Xen to pass emulation off to
> qemu, as it does with virtual disks or virtual networks.  This means that

QEMU

> they must be emulated within Xen.
> 
> The actual vulnerability, like most vulnerabilities, is pretty simple.  Xen
> implements 256 x2apic registers.  These registers are stored in a buffer big
> enough to hold exactly 256 registers. However, the limit check for reading
> these registers was erroneosly set to 1024.
> 
> What this means is that, without the fix, if you read x2apic registers
> 0-255, you'll get the correct emulated value from the register buffer; but
> if you read x2apic registers 256-1023, Xen will copy hypervisor memory from
> directly afterwards into the guest.
> 
> So what this bug gives you is the ability to read (and only read) the 12k
> [1] of memory directly adjacent to where Xen is storing the first 256
> registers (and no other area of memory).
> 
> The fix simply corrects the limit check to 256.
> 
> The emulated x2apic functionality was introduced in Xen 4.1, so previous
> versions of Xen are not affected.  Neither are PV guests, since Xen does not
> provide them with any emulated hardware.
> 
> <h1>The impact</h1>
> 
> If this seems like a relatively minor issue, that's because it is. The most
> likely scenario is that that 12k of memory contains other Xen data
> structures which contain no important information.  There is, however, a
> <i>small chance</i> that this memory might contain memory from another VM;
> and a <i>small chance</i> that this memory might contain sensitive
> information, like passwords, encryption keys, or other private data.
> 
> Nonetheless, this <i>is</i> a security issue, and the XenProject takes all
> potential security issues very seriously, no matter how minor.  We have a
> mature <a href=http://www.xenproject.org/security-policy.html>process</a> in
> place to notify cloud providers, distributions, and software providers so
> that they can have a fix in place before publicly disclosing any
> vulnerability.
> 
> Applying security patches proactively, even though there's very low risk
> that anyone might have their secret data leaked because of it, is a
> conscientious and diligient thing to do.  We're glad to see that so many
> cloud providers using Xen are demonstrating how seriously they take
> protecting customer data.
> 
> But it is by no means a disaster.  Those looking for a major scandal like
> Heartbleed and Shellshocker will be disappointed.
> 
> 
> [1] You may see this reported elsewhere as 3k; saying either 3k or 12k is
> simplifiying the truth in different ways.  The MSR data is laid out as a
> 16-byte structure, of which only the first four bytes (one 32-bit word) can
> be read by this vulnerability.  So the actual amount of data which is
> exposed is 3k, but it's spread out in 4-byte chunks across 12k of memory.
> 
> 
> _______________________________________________
> Publicity mailing list
> Publicity@xxxxxxxxxxxxxxxxxxxx
> http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity

_______________________________________________
Publicity mailing list
Publicity@xxxxxxxxxxxxxxxxxxxx
http://lists.xenproject.org/cgi-bin/mailman/listinfo/publicity


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.