Bugzilla – Bug 823011
VUL-0: CVE-2013-2194: xen: XSA-55: Multiple vulnerabilities in libelf PV kernel handling
Last modified: 2014-04-01 18:05:46 UTC
Public via oss-security: Date: Mon, 03 Jun 2013 16:19:48 +0000 From: "Xen.org security team" <security@xen.org> Subject: [security@suse.de] Xen Security Advisory 55 - Multiple vulnerabilities in libelf PV kernel handling Xen Security Advisory XSA-55 Multiple vulnerabilities in libelf PV kernel handling NOTE REGARDING LACK OF EMBARGO ============================== Due to a human error this issue was prematurely publicly disclosed to the xen-devel mailing list. Therefore this advisory is being published immediately. The Xen.org security apologizes for this error and will review its procedures to avoid it in the future. STATUS OF THE FIX ================= Due to the unintended early release of these patches they have not received as much review or testing as we would have liked. Due to the method used to fix the issue we have reasonable confidence that the security vulnerability is addressed by these patches however there is a risk of regressions when loading kernels which are in fact OK, i.e. treating valid kernels as malicious. We have not yet been assigned a CVE number for this issue. ISSUE DESCRIPTION ================= The ELF parser used by the Xen tools to read domains' kernels and construct domains has multiple integer overflows, pointer dereferences based on calculations from unchecked input values, and other problems. IMPACT ====== A malicious PV domain administrator who can specify their own kernel can escalate their privilege to that of the domain construction tools (i.e., normally, to control of the host). Additionally a malicious HVM domain administrator who is able to supply their own firmware ("hvmloader") can do likewise; however we think this would be very unusual and it is unlikely that such configurations exist in production systems. VULNERABLE SYSTEMS ================== All Xen versions are affected. Installations which only allow the use of trustworthy kernels for PV domains are not affected. MITIGATION ========== Ensuring that PV guests use only trustworthy kernels will avoid this problem. RESOLUTION ========== Applying the appropriate attached patch series is intended to resolve this issue. xsa55-4.1/*.patch Xen 4.1.x xsa55-4.2/*.patch Xen 4.2.x xsa55-unstable/*.patch xen-unstable $ sha256sum xsa55-*/**.patch 0806c7fd33e659d1b7f5a8fa6ee0a295b45c77bcc2feeb9ffcb94b02d847ac02 xsa55-4.1/0001-libelf-abolish-libelf-relocate.c.patch 965a511d6d8c37616d10381ae6df70c3dd5872898b121f67f0963cec1025d875 xsa55-4.1/0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch 6e745ca2e2c209bc65926a48ed868d061af842036dbe8e1a9193c9d8a045e77d xsa55-4.1/0003-libelf-abolish-elf_sval-and-elf_access_signed.patch d5da28d86626e0de39d21fce374fb72ad1cec4223429041a43b75921c9702961 xsa55-4.1/0004-libelf-xc_dom_load_elf_symtab-Do-not-use-syms-uninit.patch 2423669ed389c532c05d8813b3f678cff314251af18f7fc56960eca3708b9c22 xsa55-4.1/0005-libelf-introduce-macros-for-memory-access-and-pointe.patch 0a021f4e6aa646aee47786cd63d2514a27d543115e8c1820baacc27b4afe3c28 xsa55-4.1/0006-tools-xcutils-readnotes-adjust-print_l1_mfn_valid_no.patch 87cd22f2479c125b6997bf6efc449179790f39e5951d4853d93b8836c3b47287 xsa55-4.1/0007-libelf-check-nul-terminated-strings-properly.patch 17c16ec73fcf4166777c692ba0e1733d046f5fe6f747e81689f7b4915ee3e1e7 xsa55-4.1/0008-libelf-check-all-pointer-accesses.patch 6501bb4f208a0ca0fbd7f1e2c38d55f01a992d0f3ad2cf190a104749818e7ae0 xsa55-4.1/0009-libelf-Check-pointer-references-in-elf_is_elfbinary.patch 012467b3bea8553a8556daae6bceab15f934306f7067bc20033d5313a3804048 xsa55-4.1/0010-libelf-Make-all-callers-call-elf_check_broken.patch 5e7d223b5386b9a8e15999700008e1db9cab011e672eed08a973447d806fb57c xsa55-4.1/0011-libelf-use-C99-bool-for-booleans.patch 35bff8abd08343257ee623b5e280e96065e2a6618bb448e2ab8254242d485cb3 xsa55-4.1/0012-libelf-use-only-unsigned-integers.patch 3db711c397541c5841a8a2da3446144474ff1040cd3813ce2c31ebebf603537d xsa55-4.1/0013-libelf-check-loops-for-running-away.patch 9d27078f976d9e21c862feaef4603b319774ccaec78ef1dc4c92eab6cb2fa847 xsa55-4.1/0014-libelf-abolish-obsolete-macros.patch 7f9d868985dd851e7f00ab76b443698d911216579d7e18bfa46e0fa04b416404 xsa55-4.2/0001-libelf-abolish-libelf-relocate.c.patch f10c538555c79d6093af1a36ac1239078c64b4045f0b74c965cdbc0473e60d42 xsa55-4.2/0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch 23f3f9d5c52f6a2a76050ad8db2e0e21001e6b520b36d5d5d4df174e4e6fc9a5 xsa55-4.2/0003-libelf-add-struct-elf_binary-parameter-to-elf_load_i.patch b246052c87f2eb4b094ea8b20bfb87b1d6a5a89496d4d23e087cb9bc03b0e01a xsa55-4.2/0004-libelf-abolish-elf_sval-and-elf_access_signed.patch ae07b29d2fdb47c54841d16fd7f5e057b8858c14a7404b3c1ffffc8f43f8fe06 xsa55-4.2/0005-libelf-move-include-of-asm-guest_access.h-to-top-of-.patch bb437d324f641face7fd6f48ddba381c5dcb043c8231b3115432ba53d297f372 xsa55-4.2/0006-libelf-xc_dom_load_elf_symtab-Do-not-use-syms-uninit.patch f7ca43339d1f0c6354478cfaa3393cd8509878a062b6d3c9a69b746239c23019 xsa55-4.2/0007-libelf-introduce-macros-for-memory-access-and-pointe.patch 736b968fe21596b1ede2817f9255f88002cc0e4489a39a382675cae8f2b3f161 xsa55-4.2/0008-tools-xcutils-readnotes-adjust-print_l1_mfn_valid_no.patch 98bde2b49b040e6e085a3c1e99ba18926a5ba0682f32b7aed711eb07fa199143 xsa55-4.2/0009-libelf-check-nul-terminated-strings-properly.patch f69614e3c2cbb5a6e80dc4f4a7b374f5d543456f378679917fff083442b1d76d xsa55-4.2/0010-libelf-check-all-pointer-accesses.patch 8bc58423705fbf546aa1ec56d44b7d41b2f777531bd5fab3ae8feef96b1b5aba xsa55-4.2/0011-libelf-Check-pointer-references-in-elf_is_elfbinary.patch d78d3bcafaee8dae558a1e4bd86ead9903a22e6becb888b485eac6ddaabd4447 xsa55-4.2/0012-libelf-Make-all-callers-call-elf_check_broken.patch 23b98f94176bd4205c3a337855f15c74499799419e4368a81470d62e24983f4e xsa55-4.2/0013-libelf-use-C99-bool-for-booleans.patch 08184c337fc9aea46e7bd1e476e0c40bf8d24cc319132bdc59e29e1e185f10fd xsa55-4.2/0014-libelf-use-only-unsigned-integers.patch d88033e2d63a0f12d9acc1ade5cb420f6fd8f56a46237d86b40706750e1181e9 xsa55-4.2/0015-libelf-check-loops-for-running-away.patch 62a3811bdea007d9083199d7a101932a4eaaffba07999a8b841bf35718e33b08 xsa55-4.2/0016-libelf-abolish-obsolete-macros.patch e68c4d3a5f81f4511b605b0a31af1a6316e75eef0f876a8e4fbacffbd33a3bc3 xsa55-unstable/0001-libelf-abolish-libelf-relocate.c.patch b735bed4a919001c8f0e94285e84435bacc6ce51107b1d78d5d2f54827f7dd0e xsa55-unstable/0002-libxc-introduce-xc_dom_seg_to_ptr_pages.patch 7102467603f1d7bc577421e5087cb90186bb2f7e7b412f849b5fa28be2d9db8a xsa55-unstable/0003-libelf-add-struct-elf_binary-parameter-to-elf_load_i.patch bcb2b79864cdb6827376f521275c0e1327c9347f898b28b76346ff6309f89a0f xsa55-unstable/0004-libelf-abolish-elf_sval-and-elf_access_signed.patch 3bca1907fec2a3a233511980070a712d6052c3f17d5d1c1b21f808a09edf839b xsa55-unstable/0005-libelf-move-include-of-asm-guest_access.h-to-top-of-.patch 0bc3be2ace08cbf5bc9e80273486eae7ca78cb0b0967bdf6bb6a979aee6950bc xsa55-unstable/0006-libelf-xc_dom_load_elf_symtab-Do-not-use-syms-uninit.patch e93fef15ec83f098fe52d5c093bf3d6d1d520e588e71a47b94596a2031a6b4b4 xsa55-unstable/0007-libelf-introduce-macros-for-memory-access-and-pointe.patch 620c5606749f4f0b4fa0f24bdace3d8ad2dcc5c5ae86144e1b70fdfee9abdea1 xsa55-unstable/0008-tools-xcutils-readnotes-adjust-print_l1_mfn_valid_no.patch 789679f20e4836fe0de903ed6f49de0329a2438e5533a88011327e051eece671 xsa55-unstable/0009-libelf-check-nul-terminated-strings-properly.patch b0c3305b67c63c9cc05d28cf2a367af41aa01911be04d9dd37dfa62a504a99fc xsa55-unstable/0010-libelf-check-all-pointer-accesses.patch abe0993e06d907d46883425025126be114d9464a0c10ae4cb50efffb8e74f30a xsa55-unstable/0011-libelf-Check-pointer-references-in-elf_is_elfbinary.patch d93a31551d8052bf488217b1c9836b9e2a47f115673469e33f950465ca516631 xsa55-unstable/0012-libelf-Make-all-callers-call-elf_check_broken.patch 686c4f29ec5f2fc567d7490d5391008bd399eb260274d9a4c49eae66670ed835 xsa55-unstable/0013-libelf-use-C99-bool-for-booleans.patch 2652866b241e69be4dcea49c4798fdcf1e78cf31da93b49381f2b256a6d921b8 xsa55-unstable/0014-libelf-use-only-unsigned-integers.patch b487e09440cd36ebc1c58ec229eb89ead3b93368c2f1716781bab953bab3baca xsa55-unstable/0015-libelf-check-loops-for-running-away.patch 217820c0ab0aef6eba23ee4b8a83d0bbffe7675f4cd7d907e1cc3b14840f609f xsa55-unstable/0016-libelf-abolish-obsolete-macros.patch
Created attachment 542455 [details] All XSA55 fixes for 4.1.
Created attachment 542456 [details] All XSA55 fixes for 4.2.
Created attachment 542457 [details] All XSA55 fixes for unstable branch.
Removed wrong CVE from summary. Waiting for CVE assignment.
Version 4 patches for XSA-55 are available: http://seclists.org/oss-sec/2013/q2/561
Created attachment 544366 [details] X
Created attachment 544367 [details] All XSA55 fixes for 4.1. (v4)
Created attachment 544368 [details] All XSA55 fixes for 4.2. (v4)
Created attachment 544369 [details] All XSA55 fixes for unstable branch. (v4)
The following CVEs got assigned to this XSA. CVE-2013-2194 XEN XSA-55 integer overflows CVE-2013-2195 XEN XSA-55 pointer dereferences CVE-2013-2196 XEN XSA-55 other problems
Leonardo, Could we get a swamp for a sles11sp3 maintenance release? The current list of bugs are, Xen === - bnc#823011 - VUL-0: xen: XSA-55: Multiple vulnerabilities in libelf PV kernel handling - bnc#823608 - VUL-0: xen: XSA-57: libxl allows guest write access to sensitive console related xenstore keys - bnc#826882 - VUL-0: xen: CVE-2013-1432: XSA-58: Page reference counting error due to XSA-45/CVE-2013-1918 fixes - bnc#808269 - Fully Virtualized Windows VM install is failed on Ivy Bridge platforms with Xen kernel - bnc#801663 - performance of mirror lvm unsuitable for production Libvirt ======= - bnc#828506 - libvirt reads out of bounds - bnc#828508 - libvirt fails on block migration in SUSE Cloud environment - bnc#828502 - libvirt crashes on on migration of graphics-less clients
The SWAMPID for this issue is 53511. This issue was rated as important. Please submit fixed packages until 2013-07-18. When done, please reassign the bug to security-team@suse.de. Patchinfo will be handled by security team.
lets do this as a security update. please submit
Xen and Libvirt have been submitted with the following requests; Xen: SR#27695 Libvirt: SR#27703
Update released for: xen, xen-debuginfo, xen-debugsource, xen-devel, xen-doc-html, xen-doc-pdf, xen-kmp-debug, xen-kmp-default, xen-kmp-pae, xen-kmp-trace, xen-kmp-vmi, xen-libs, xen-libs-32bit, xen-tools, xen-tools-domU Products: SLE-DEBUGINFO 11-SP3 (i386, x86_64) SLE-DESKTOP 11-SP3 (i386, x86_64) SLE-SDK 11-SP3 (i386, x86_64) SLE-SERVER 11-SP3 (i386, x86_64)
openSUSE-SU-2013:1392-1: An update that solves 12 vulnerabilities and has 7 fixes is now available. Category: security (moderate) Bug References: 801663,803712,809662,813673,813675,813677,814709,816156,816159,816163,819416,820917,820919,820920,823011,823608,823786,824676,826882 CVE References: CVE-2013-1432,CVE-2013-1917,CVE-2013-1918,CVE-2013-1919,CVE-2013-1920,CVE-2013-1952,CVE-2013-1964,CVE-2013-2072,CVE-2013-2076,CVE-2013-2077,CVE-2013-2078,CVE-2013-2211 Sources used: openSUSE 12.2 (src): xen-4.1.5_04-5.29.1
openSUSE-SU-2013:1404-1: An update that solves 13 vulnerabilities and has 13 fixes is now available. Category: security (moderate) Bug References: 797285,797523,801663,802221,808085,808269,809662,813673,813675,814059,814709,816159,816163,817068,817210,817799,817904,818183,819416,820917,820919,820920,823011,823608,824676,826882 CVE References: CVE-2012-6075,CVE-2013-0151,CVE-2013-1432,CVE-2013-1917,CVE-2013-1918,CVE-2013-1919,CVE-2013-1922,CVE-2013-1952,CVE-2013-2007,CVE-2013-2072,CVE-2013-2076,CVE-2013-2077,CVE-2013-2078 Sources used: openSUSE 12.3 (src): xen-4.2.2_06-1.16.1
done i guess for the interesting releases
Hmm, LTSS branches of SLE11 SP1 and SLE10 have got these backported only last week, and I don't think releasing those went that quickly.
they were not submitted yet... so I was too fast here, sorry ;) reopen
Update released for: xen, xen-debuginfo, xen-debugsource, xen-devel, xen-doc-html, xen-doc-pdf, xen-kmp-debug, xen-kmp-default, xen-kmp-pae, xen-kmp-trace, xen-kmp-vmi, xen-libs, xen-libs-32bit, xen-tools, xen-tools-domU Products: SLE-DEBUGINFO 11-SP2 (i386, x86_64) SLE-DESKTOP 11-SP2 (i386, x86_64) SLE-SDK 11-SP2 (i386, x86_64) SLE-SERVER 11-SP2 (i386, x86_64) SLES4VMWARE 11-SP2 (i386, x86_64)
Update released for: xen, xen-debuginfo, xen-devel, xen-doc-html, xen-doc-pdf, xen-doc-ps, xen-kmp-debug, xen-kmp-default, xen-kmp-kdump, xen-kmp-pae, xen-kmp-smp, xen-kmp-trace, xen-libs, xen-libs-32bit, xen-tools, xen-tools-domU, xen-tools-ioemu Products: SLE-SERVER 10-SP3-TERADATA (x86_64)
Update released for: xen, xen-debuginfo, xen-debugsource, xen-devel, xen-doc-html, xen-doc-pdf, xen-kmp-debug, xen-kmp-default, xen-kmp-pae, xen-kmp-trace, xen-libs, xen-tools, xen-tools-domU Products: SLE-SERVER 11-SP1-TERADATA (x86_64)
Closing as TERADATA packages got released.
Update released for: xen, xen-debuginfo, xen-debugsource, xen-devel, xen-doc-html, xen-doc-pdf, xen-doc-ps, xen-kmp-bigsmp, xen-kmp-debug, xen-kmp-default, xen-kmp-kdump, xen-kmp-kdumppae, xen-kmp-pae, xen-kmp-smp, xen-kmp-trace, xen-kmp-vmi, xen-kmp-vmipae, xen-libs, xen-libs-32bit, xen-libs-x86, xen-tools, xen-tools-domU, xen-tools-ioemu Products: SLE-DEBUGINFO 10-SP4 (i386, x86_64) SLE-SERVER 10-SP4-LTSS (i386, x86_64)
SUSE-SU-2014:0411-1: An update that fixes 11 vulnerabilities is now available. Category: security (important) Bug References: 787163,813673,813677,823011,840592,842511,848657,849668,853049 CVE References: CVE-2012-4544,CVE-2013-1917,CVE-2013-1920,CVE-2013-2194,CVE-2013-2195,CVE-2013-2196,CVE-2013-4355,CVE-2013-4368,CVE-2013-4494,CVE-2013-4554,CVE-2013-6885 Sources used: SUSE Linux Enterprise Server 10 SP4 LTSS (src): xen-3.2.3_17040_46-0.7.1
Update released for: xen, xen-debuginfo, xen-debugsource, xen-devel, xen-doc-html, xen-doc-pdf, xen-kmp-debug, xen-kmp-default, xen-kmp-pae, xen-kmp-trace, xen-kmp-vmi, xen-libs, xen-libs-32bit, xen-tools, xen-tools-domU Products: SLE-DEBUGINFO 11-SP1 (i386, x86_64) SLE-SERVER 11-SP1-LTSS (i386, x86_64)
SUSE-SU-2014:0446-1: An update that fixes 47 vulnerabilities is now available. Category: security (important) Bug References: 777628,777890,779212,786516,786517,786519,786520,787163,789944,789945,789948,789950,789951,794316,797031,797523,800275,805094,813673,813675,813677,816156,816159,816163,819416,820917,820919,823011,823608,826882,831120,839596,839618,840592,841766,842511,848657,849667,849668,853049,860163 CVE References: CVE-2006-1056,CVE-2007-0998,CVE-2012-3497,CVE-2012-4411,CVE-2012-4535,CVE-2012-4537,CVE-2012-4538,CVE-2012-4539,CVE-2012-4544,CVE-2012-5510,CVE-2012-5511,CVE-2012-5513,CVE-2012-5514,CVE-2012-5515,CVE-2012-5634,CVE-2012-6075,CVE-2012-6333,CVE-2013-0153,CVE-2013-0154,CVE-2013-1432,CVE-2013-1442,CVE-2013-1917,CVE-2013-1918,CVE-2013-1919,CVE-2013-1920,CVE-2013-1952,CVE-2013-1964,CVE-2013-2072,CVE-2013-2076,CVE-2013-2077,CVE-2013-2194,CVE-2013-2195,CVE-2013-2196,CVE-2013-2211,CVE-2013-2212,CVE-2013-4329,CVE-2013-4355,CVE-2013-4361,CVE-2013-4368,CVE-2013-4494,CVE-2013-4553,CVE-2013-4554,CVE-2013-6885,CVE-2014-1891,CVE-2014-1892,CVE-2014-1893,CVE-2014-1894 Sources used: SUSE Linux Enterprise Server 11 SP1 LTSS (src): xen-4.0.3_21548_16-0.5.1
Update released for: xen, xen-debuginfo, xen-debugsource, xen-devel, xen-doc-html, xen-doc-pdf, xen-doc-ps, xen-kmp-bigsmp, xen-kmp-debug, xen-kmp-default, xen-kmp-kdump, xen-kmp-kdumppae, xen-kmp-pae, xen-kmp-smp, xen-kmp-trace, xen-kmp-vmi, xen-kmp-vmipae, xen-libs, xen-libs-32bit, xen-libs-x86, xen-tools, xen-tools-domU, xen-tools-ioemu Products: SLE-DEBUGINFO 10-SP3 (i386, x86_64) SLE-SERVER 10-SP3-LTSS (i386, x86_64)
SUSE-SU-2014:0470-1: An update that fixes 15 vulnerabilities is now available. Category: security (important) Bug References: 786516,786517,787163,789950,789951,813673,813677,823011,840592,842511,848657,849668,853049 CVE References: CVE-2012-4535,CVE-2012-4537,CVE-2012-4544,CVE-2012-5513,CVE-2012-5515,CVE-2013-1917,CVE-2013-1920,CVE-2013-2194,CVE-2013-2195,CVE-2013-2196,CVE-2013-4355,CVE-2013-4368,CVE-2013-4494,CVE-2013-4554,CVE-2013-6885 Sources used: SUSE Linux Enterprise Server 10 SP3 LTSS (src): xen-3.2.3_17040_28-0.6.21.3