29 April 2015
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2015.1106.2 Xen Security Advisory XSA-132 29 April 2015 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Xen Publisher: Xen Operating System: Xen Impact/Access: Access Confidential Data -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2015-3340 Original Bulletin: http://xenbits.xen.org/xsa/advisory-132.html Revision History: April 29 2015: CVE assigned April 22 2015: Initial Release - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Xen Security Advisory CVE-2015-3340 / XSA-132 version 2 Information leak through XEN_DOMCTL_gettscinfo UPDATES IN VERSION 2 ==================== CVE assigned. ISSUE DESCRIPTION ================= The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding field subsequently copied to guest memory. A similar leak existed in XEN_SYSCTL_getdomaininfolist, which is being addressed here regardless of that operation being declared unsafe for disaggregation by XSA-77. IMPACT ====== Malicious or buggy stub domain kernels or tool stacks otherwise living outside of Domain0 may be able to read sensitive data relating to the hypervisor or other guests not under the control of that domain. VULNERABLE SYSTEMS ================== Xen 4.0.x and later are vulnerable. Only x86 systems are vulnerable. ARM systems are not vulnerable. The vulnerability is only exposed to service domains with privilege over another guest. In a usual configuration that means only device model emulators (qemu-dm) when these are running in a separate domain. In the case of HVM guests whose device model is running in an unrestricted dom0 process, qemu-dm already has the ability to cause problems for the whole system. So in that case the vulnerability is not applicable. This vulnerability is applicable for an HVM guest with a stub qemu-dm. That is, where the device model runs in a separate domain (in the case of xl, as requested by "device_model_stubdomain_override=1" in the xl domain configuration file). In this case a guest which has already exploited another vulnerability, to gain control of the device model, would be able to exercise the information leak. However, the security of a system with qemu-dm running in a stub domain is still better than with a qemu-dm running as an unrestricted dom0 process. Therefore users with these configurations should not switch to an unrestricted dom0 qemu-dm. Finally, in a radically disaggregated system, where the service domain software (probably, the device model domain image in the HVM case) is not always supplied by the host administrator, a malicious service domain administrator can exercise this vulnerability. MITIGATION ========== There is no mitigation available. In a radically disaggregated system, restricting HVM service domains to software images approved by the host administrator will avoid the vulnerability (so long as there isn't also a vulnerability in the service domain). NOTE REGARDING LACK OF EMBARGO ============================== The fix for this bug was publicly posted on xen-devel, before it was appreciated that there was a security problem. CREDITS ======= This issue was recognized as security issue by Jan Beulich of SUSE. RESOLUTION ========== Applying the appropriate attached patch resolves this issue. xsa132-unstable.patch xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x xsa132-4.2.patch Xen 4.2.x $ sha256sum xsa132*.patch 3a28eb33c02360ec22c51824e469b1cf6be87941256d0b3aa34a5bd1d7735328 xsa132-4.2.patch 329d4edf1e1133795ece41f2fc8887c5f4cc06b42ced63c810c610b17bcee46d xsa132.patch $ - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) iQEcBAEBAgAGBQJVN6AYAAoJEIP+FMlX6CvZ6R8H/Rq4H94uwp/c8mYM/DHFJf1S YXWGD7jtYYAArAKwG+b3mDYQVzaDhsUR76jS6lssoSWQbSHmqzAKWjZ01Rd5EQDW PqLNwtmIkj9hXCxJdpNubxbr12j0TWzIAOpsUj5alDoy7TaNVMNLG7zSj+jOyNzp uCgIo7TGwWu6OS1xBYZay18oTjv8rEifQgJ8CBRUZHG+xezm94Gbz0iJaonm4bY3 Rjl7U3hfk0O74ncthHOJM5bVTXyDefxeZsR1xkRIWk15GSZ9FXguwfny/m0NQC7Y 7OfGyOyOT27AbxYTOnn30XYwmPAzhw1jrEpdbAwSjxvzRe9iKoxwhezrzgXQ+Q0= =1c8S - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to firstname.lastname@example.org and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: email@example.com Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBVUB5vBLndAQH1ShLAQK2bA/+JEKraqXLs6QP3Q09Cgp5k3tDJgRyArjH tEhKMn+H7S07m0iAKsXIRbb8vb2ltJ6wH0J53fNXn2VvDo0esLHRbSILapGRSHI4 Sj0iBdpTwgs9tkVsSPMdHH7YxxEHtGLk/VOQJusIjzmLvn5YRB4Hhjkmm8EMWvD2 7ZFc06u55TzWa7nc1zASX6m4kci5HWYXtxMtn+PiqJZI6RO+blma04iBFF2ye2YZ 5QxeR9gjK/OeATWyqyRl/d+c7uQ9PfSuzo6IjnWBG9juwm98bcUO11vE6OffkJAU JOVm9AOnNzJ6KhQDL1hEuGBgpEl2CGpiDy0JzuG5O8Eo+Et4t7h6eCrD0jZpL/xB lQ9fg8n/R4YqS0C435GYLfHqAp7cq4yZ/pzdeL0aHPd6wH0e8lh5HwQNDPpFMLLR ik+1qNEJ8LWaoUumQh/HXx0OEAOya81uEB49wI9Tk+3mXTgNMsQlb+sJVUfmS5MG iqbBg4VlMGETpABe5QEdPBV3OXXTJTxTnlvowg15cXstX96rWDjCmUDflM800+Qb gipcKA7wbWbcMQ+fnpU+dPZGAxGToDYEwx3HniUF/fN0hKJQMtt9+gMjasCimzO5 igQGdKt1hC2qbMMM9FkyBBAylYiw9CzC2pcayNmX+UxITKuMSchw6mAzofRvRt4D QU0+q157Vm4= =ua26 -----END PGP SIGNATURE-----