Bug 881485 (CVE-2014-3969) - VUL-0: CVE-2014-3969: XSA-98: Xen: Insufficient permissions checks accessing guest memory on ARM
Summary: VUL-0: CVE-2014-3969: XSA-98: Xen: Insufficient permissions checks accessing ...
Status: VERIFIED WONTFIX
Alias: CVE-2014-3969
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other openSUSE 13.1
: P5 - None : Normal
Target Milestone: ---
Assignee: Charles Arnold
QA Contact: Security Team bot
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2014-06-05 08:48 UTC by Johannes Segitz
Modified: 2015-03-16 07:06 UTC (History)
1 user (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
xsa98-4.4-01 (5.57 KB, patch)
2014-06-05 08:49 UTC, Johannes Segitz
Details | Diff
xsa98-4.4-02 (7.62 KB, patch)
2014-06-05 08:49 UTC, Johannes Segitz
Details | Diff
xsa98-unstable-01 (5.57 KB, patch)
2014-06-05 08:50 UTC, Johannes Segitz
Details | Diff
xsa98-unstable-02 (7.73 KB, patch)
2014-06-05 08:50 UTC, Johannes Segitz
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Johannes Segitz 2014-06-05 08:48:39 UTC
ISSUE DESCRIPTION
=================

When accessing guest memory Xen does not correctly perform permissions
checks on the (possibly guest provided) virtual address: it only
checks that the mapping is readable by the guest, even when writing on
behalf of the guest.  This allows a guest to write to memory which
it should only be able to read.

A guest running on a vulnerable system is able to write to memory
which should be read-only.  This includes supposedly read only foreign
mappings established using the grant table mechanism.  Such read-only
mappings are commonly used as part of the paravirtualised I/O drivers
(such as guest disk write and network transmit).

In order to exploit this vulnerability the guest must have a mapping
of the memory; it does not allow access to arbitrary addresses.

In the event that a guest executes code from a page which has been
shared read-only with another guest it would be possible to mount a
take over attack on that guest.

IMPACT
======

A domain which is deliberately exchanging data with another,
malicious, domain, may be vulnerable to privilege escalation.  The
vulnerability depends on the precise behaviour of the victim domain.

In a typical configuration this means that, depending on the behaviour
of the toolstack or device driver domain, a malicious guest
administrator might be able to escalate their privilege to that of the
whole host.

VULNERABLE SYSTEMS
==================Both 32- and 64-bit ARM systems are vulnerable from Xen 4.4 onward.

MITIGATION
==========

None.

CREDITS
=======

This issue was discovered by Julien Grall.

RESOLUTION
==========

Applying the appropriate pair of attached patches resolves this issue.

xsa98-unstable-{01,02}.patch        xen-unstable
xsa98-4.4-{01,02}.patch             Xen 4.4.x
Comment 1 Johannes Segitz 2014-06-05 08:49:32 UTC
Created attachment 593452 [details]
xsa98-4.4-01
Comment 2 Johannes Segitz 2014-06-05 08:49:54 UTC
Created attachment 593453 [details]
xsa98-4.4-02
Comment 3 Johannes Segitz 2014-06-05 08:50:16 UTC
Created attachment 593454 [details]
xsa98-unstable-01
Comment 4 Johannes Segitz 2014-06-05 08:50:38 UTC
Created attachment 593455 [details]
xsa98-unstable-02
Comment 5 Alexander Bergmann 2014-06-05 09:01:39 UTC
Just for reference inside the bug: This is CVE-2014-3969 and XSA-98.b
Comment 6 Johannes Segitz 2014-06-05 09:08:54 UTC
not supported on SLES or openSUSE
Comment 7 Johannes Segitz 2014-06-05 09:17:57 UTC
ARM is available in openSUSE, reopening and adjusting platform