|
Message-Id: <E1kpaDs-0006x2-Os@xenbits.xenproject.org> Date: Wed, 16 Dec 2020 17:04:20 +0000 From: Xen.org security team <security@....org> To: xen-announce@...ts.xen.org, xen-devel@...ts.xen.org, xen-users@...ts.xen.org, oss-security@...ts.openwall.com CC: Xen.org security team <security-team-members@....org> Subject: Xen Security Advisory 343 v5 (CVE-2020-25599) - races with evtchn_reset() -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Xen Security Advisory CVE-2020-25599 / XSA-343 version 5 races with evtchn_reset() UPDATES IN VERSION 5 ==================== In the RESOLUTION section, describe and list the followup fixes for vm_event. ISSUE DESCRIPTION ================= Uses of EVTCHNOP_reset (potentially by a guest on itself) or XEN_DOMCTL_soft_reset (by itself covered by XSA-77) can lead to the violation of various internal assumptions. This may lead to out of bounds memory accesses or triggering of bug checks. IMPACT ====== In particular x86 PV guests may be able to elevate their privilege to that of the host. Host and guest crashes are also possible, leading to a Denial of Service (DoS). Information leaks cannot be ruled out. VULNERABLE SYSTEMS ================== All Xen versions from 4.5 onwards are vulnerable. Xen versions 4.4 and earlier are not vulnerable. MITIGATION ========== There is no known mitigation. CREDITS ======= Different aspects of this issue were discovered by Julien Grall of Amazon and by Jan Beulich of SUSE. RESOLUTION ========== Applying the appropriate set of attached patches resolves this issue. Note that patches for released versions are generally prepared to apply to the stable branches, and may not apply cleanly to the most recent release tarball. Downstreams are encouraged to update to the tip of the stable branch before applying these patches. The original patches (still listed later, below, unchanged since XSA-343 v4) cause problems with the vm_event event subsystem (part of Virtual Machine Introspection), and with Xen paging and memory sharing. Fixes for these issues have been applied to the Xen public branches. These are not security-supported features, but for completeness we list those fixes here, now (commit hashes are those from the master branch): 6f6f07b64cbe90e54f8e62b4d6f2404cf5306536 evtchn/fifo: use stable fields when recording "last queue" information 5f2df45ead7c1195142f68b7923047a1e9479d54 xen/evtchn: rework per event channel lock b5ad37f8e9284cc147218f7a5193d739ae7b956f xen/evtchn: revert 52e1fc47abc3a0123 1277cb9dc5e966f1faf665bcded02b7533e38078 xen/events: access last_priority and last_vcpu_id together 71ac522909e9302350a88bc378be99affa87067c xen/events: rework fifo queue locking Backports of these have also been applied to the respective stable branches of the tree. The middle one, being a revert, of course is applicable only if the original change "evtchn/Flask: pre-allocate node on send path" (or a backport of it) had been applied previously. xsa343/xsa343-?.patch Xen 4.13 - xen-unstable xsa343/xsa343-4.12-?.patch Xen 4.12 xsa343/xsa343-4.11-?.patch Xen 4.11 xsa343/xsa343-4.10-?.patch Xen 4.10 $ sha256sum xsa343* xsa343*/* 097d5fa32e22fc7a18fddd757f950699e823202bbae67245eece783d6d06f4eb xsa343.meta d714a542bae9d96b6a061c5a8f754549d699dcfb7bf2a766b721f6bbe33aefd2 xsa343/xsa343-1.patch 657c44c8ea13523d2e59776531237bbc20166c9b7c3960e0e9ad381fce927344 xsa343/xsa343-2.patch 2b275e3fa559167c1b59e6fd4a20bc4d1df9d9cb0cbd0050a3db9c3d0299b233 xsa343/xsa343-3.patch 9aec124e2afcba57f8adaf7374ecebffc4a8ed1913512a7456f87761bb115f68 xsa343/xsa343-4.10-1.patch 54d9ce9acdb8dcc6aa81928037afbb081a6cd579127aa225833767e285e30ea2 xsa343/xsa343-4.10-2.patch 3801300cddd8d138c800dc45eeff111e313eb40cea3aa94e2e045ac8956ab9d3 xsa343/xsa343-4.10-3.patch 7abbec828f77c427a53182db820fc19bdf34e37882fc6ae51351ed6027c56da1 xsa343/xsa343-4.11-1.patch 5c90a53333e9c81ce938deddfc690f474d61e083d2a43b859d3227100f793aff xsa343/xsa343-4.11-2.patch 0e12cfe8e505b9685912c61a740b98084d62e4ba0670d51a47345739f463a039 xsa343/xsa343-4.11-3.patch f3462b4e672f69a9fa951b1c04a50d754c64d18aadf444ef248587b3ac7f635a xsa343/xsa343-4.12-1.patch d99cbbc3792755c4998b73460bbeaef5612a8942f98adcaea0762950e5a07c2a xsa343/xsa343-4.12-2.patch cf23d3b61d4f07efc7057035c45e53e32a0b0f8fc3b9bc6c05f0f5bc71204914 xsa343/xsa343-4.12-3.patch $ DEPLOYMENT DURING EMBARGO ========================= Deployment of the patches and/or mitigations described above (or others which are substantially similar) is permitted during the embargo, even on public-facing systems with untrusted guest users and administrators. But: Distribution of updated software is prohibited (except to other members of the predisclosure list). Predisclosure list members who wish to deploy significantly different patches and/or mitigations, please contact the Xen Project Security Team. (Note: this during-embargo deployment notice is retained in post-embargo publicly released Xen Project advisories, even though it is then no longer applicable. This is to enable the community to have oversight of the Xen Project Security Team's decisionmaking.) For more information about permissible uses of embargoed information, consult the Xen Project community's agreed Security Policy: http://www.xenproject.org/security-policy.html -----BEGIN PGP SIGNATURE----- iQFABAEBCAAqFiEEI+MiLBRfRHX6gGCng/4UyVfoK9kFAl/aPdYMHHBncEB4ZW4u b3JnAAoJEIP+FMlX6CvZlucH/Rbh47bbMflkGfu5JChDnYvLbJ1RHxtJg95ENvGr MSIL5QbAzJSvRfiiNqhMny4ykxmuWdrU4nFQCM1xk6B/84cRYPGHTpzLS3yE+dP3 Q5LHDYBR6DPoaP9608xFWWAk6+Mb42uKOstQTEBnOKG8qknYJ2RzOLgZ1m9/FWP6 +6AuFe82omBdw8lCw4pFOOeIONfxFXCVU6tbenP4PmdzMQSJr8sQ0ToRkfT+2bHr dTpmUKsOU2WCJ6v3+YrPtPhGhdzypm55Sdr6x7ikoF+iANN5RHW8V3l6Qupyghtm L2R907aFVzfqgOKwuRV4gGGPvnuy78EtEljPnp9ZJxhCl6U= =Sk1L -----END PGP SIGNATURE----- Download attachment "xsa343.meta" of type "application/octet-stream" (2436 bytes) Download attachment "xsa343/xsa343-1.patch" of type "application/octet-stream" (6549 bytes) Download attachment "xsa343/xsa343-2.patch" of type "application/octet-stream" (8313 bytes) Download attachment "xsa343/xsa343-3.patch" of type "application/octet-stream" (14475 bytes) Download attachment "xsa343/xsa343-4.10-1.patch" of type "application/octet-stream" (6117 bytes) Download attachment "xsa343/xsa343-4.10-2.patch" of type "application/octet-stream" (8178 bytes) Download attachment "xsa343/xsa343-4.10-3.patch" of type "application/octet-stream" (14025 bytes) Download attachment "xsa343/xsa343-4.11-1.patch" of type "application/octet-stream" (6119 bytes) Download attachment "xsa343/xsa343-4.11-2.patch" of type "application/octet-stream" (8178 bytes) Download attachment "xsa343/xsa343-4.11-3.patch" of type "application/octet-stream" (14028 bytes) Download attachment "xsa343/xsa343-4.12-1.patch" of type "application/octet-stream" (6156 bytes) Download attachment "xsa343/xsa343-4.12-2.patch" of type "application/octet-stream" (8158 bytes) Download attachment "xsa343/xsa343-4.12-3.patch" of type "application/octet-stream" (14028 bytes)
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.