Bug 927967 (CVE-2015-3340) - VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (XSA-132)
Summary: VUL-0: CVE-2015-3340: xen: Information leak through XEN_DOMCTL_gettscinfo (X...
Status: RESOLVED FIXED
Alias: CVE-2015-3340
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL:
Whiteboard: maint:running:61703:important main...
Keywords:
Depends on:
Blocks:
 
Reported: 2015-04-21 10:06 UTC by Andreas Stieger
Modified: 2015-12-19 16:37 UTC (History)
4 users (show)

See Also:
Found By: ---
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments
advisory patch (849 bytes, patch)
2015-04-21 10:06 UTC, Andreas Stieger
Details | Diff
xsa132-4.2.patch (866 bytes, patch)
2015-04-21 10:07 UTC, Andreas Stieger
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Andreas Stieger 2015-04-21 10:06:43 UTC
Created attachment 631762 [details]
advisory patch

http://xenbits.xen.org/xsa/advisory-132.html

                    Xen Security Advisory XSA-132

             Information leak through XEN_DOMCTL_gettscinfo

ISSUE DESCRIPTION
=================

The handler for XEN_DOMCTL_gettscinfo failed to initialize a padding
field subsequently copied to guest memory.

A similar leak existed in XEN_SYSCTL_getdomaininfolist, which is being
addressed here regardless of that operation being declared unsafe for
disaggregation by XSA-77.

IMPACT
======

Malicious or buggy stub domain kernels or tool stacks otherwise living
outside of Domain0 may be able to read sensitive data relating to the
hypervisor or other guests not under the control of that domain.

VULNERABLE SYSTEMS
==================

Xen 4.0.x and later are vulnerable.

Only x86 systems are vulnerable.  ARM systems are not vulnerable.

The vulnerability is only exposed to service domains with privilege over
another guest.  In a usual configuration that means only device model
emulators (qemu-dm) when these are running in a separate domain.

In the case of HVM guests whose device model is running in an
unrestricted dom0 process, qemu-dm already has the ability to cause
problems for the whole system.  So in that case the vulnerability is
not applicable.

This vulnerability is applicable for an HVM guest with a stub qemu-dm.
That is, where the device model runs in a separate domain (in the case
of xl, as requested by "device_model_stubdomain_override=1" in the xl
domain configuration file).  In this case a guest which has already
exploited another vulnerability, to gain control of the device model,
would be able to exercise the information leak.

However, the security of a system with qemu-dm running in a stub domain
is still better than with a qemu-dm running as an unrestricted dom0
process.  Therefore users with these configurations should not switch
to an unrestricted dom0 qemu-dm.

Finally, in a radically disaggregated system, where the service domain
software (probably, the device model domain image in the HVM case) is
not always supplied by the host administrator, a malicious service
domain administrator can exercise this vulnerability.

MITIGATION
==========

There is no mitigation available.

In a radically disaggregated system, restricting HVM service domains
to software images approved by the host administrator will avoid the
vulnerability (so long as there isn't also a vulnerability in the
service domain).

NOTE REGARDING LACK OF EMBARGO
==============================

The fix for this bug was publicly posted on xen-devel, before it was
appreciated that there was a security problem.

CREDITS
=======

This issue was recognized as security issue by Jan Beulich of SUSE.

RESOLUTION
==========

Applying the appropriate attached patch resolves this issue.

xsa132-unstable.patch        xen-unstable, Xen 4.5.x, Xen 4.4.x, Xen 4.3.x
xsa132-4.2.patch             Xen 4.2.x

$ sha256sum xsa132*.patch
3a28eb33c02360ec22c51824e469b1cf6be87941256d0b3aa34a5bd1d7735328  xsa132-4.2.patch
329d4edf1e1133795ece41f2fc8887c5f4cc06b42ced63c810c610b17bcee46d  xsa132.patch
Comment 1 Andreas Stieger 2015-04-21 10:07:05 UTC
Created attachment 631763 [details]
xsa132-4.2.patch
Comment 3 Swamp Workflow Management 2015-04-21 22:00:38 UTC
bugbot adjusting priority
Comment 4 Charles Arnold 2015-05-13 14:19:31 UTC
Fix for this bug included with submissions for update workflow 61703.
Comment 6 Swamp Workflow Management 2015-05-21 07:05:48 UTC
SUSE-SU-2015:0923-1: An update that fixes four vulnerabilities is now available.

Category: security (important)
Bug References: 922705,922709,927967,929339
CVE References: CVE-2015-2751,CVE-2015-2752,CVE-2015-3340,CVE-2015-3456
Sources used:
SUSE Linux Enterprise Software Development Kit 12 (src):    xen-4.4.2_04-18.1
SUSE Linux Enterprise Server 12 (src):    xen-4.4.2_04-18.1
SUSE Linux Enterprise Desktop 12 (src):    xen-4.4.2_04-18.1
Comment 7 Swamp Workflow Management 2015-05-21 22:05:08 UTC
SUSE-SU-2015:0927-1: An update that solves one vulnerability and has two fixes is now available.

Category: security (important)
Bug References: 910441,927967,929339
CVE References: CVE-2015-3456
Sources used:
SUSE Linux Enterprise Software Development Kit 11 SP3 (src):    xen-4.2.5_06-0.7.1
SUSE Linux Enterprise Server 11 SP3 (src):    xen-4.2.5_06-0.7.1
SUSE Linux Enterprise Desktop 11 SP3 (src):    xen-4.2.5_06-0.7.1
Comment 8 Swamp Workflow Management 2015-05-26 12:05:08 UTC
SUSE-SU-2015:0940-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 927967,929339
CVE References: CVE-2015-3340,CVE-2015-3456
Sources used:
SUSE Linux Enterprise Server 11 SP1 LTSS (src):    xen-4.0.3_21548_18-0.21.1
Comment 9 Swamp Workflow Management 2015-05-26 12:08:12 UTC
SUSE-SU-2015:0944-1: An update that solves two vulnerabilities and has one errata is now available.

Category: security (important)
Bug References: 910441,927967,929339
CVE References: CVE-2015-3340,CVE-2015-3456
Sources used:
SUSE Linux Enterprise Server 11 SP2 LTSS (src):    xen-4.1.6_08-0.11.1
Comment 10 Swamp Workflow Management 2015-06-02 08:05:01 UTC
openSUSE-SU-2015:0983-1: An update that fixes two vulnerabilities is now available.

Category: security (important)
Bug References: 927967,929339
CVE References: CVE-2015-3340,CVE-2015-3456
Sources used:
openSUSE 13.1 (src):    xen-4.3.4_04-44.1
Comment 12 Swamp Workflow Management 2015-06-22 10:09:16 UTC
openSUSE-SU-2015:1092-1: An update that solves 17 vulnerabilities and has 10 fixes is now available.

Category: security (important)
Bug References: 861318,882089,895528,901488,903680,906689,910254,912011,918995,918998,919098,919464,919663,921842,922705,922706,922709,923758,927967,929339,931625,931626,931627,931628,932770,932790,932996
CVE References: CVE-2014-3615,CVE-2015-2044,CVE-2015-2045,CVE-2015-2151,CVE-2015-2152,CVE-2015-2751,CVE-2015-2752,CVE-2015-2756,CVE-2015-3209,CVE-2015-3340,CVE-2015-3456,CVE-2015-4103,CVE-2015-4104,CVE-2015-4105,CVE-2015-4106,CVE-2015-4163,CVE-2015-4164
Sources used:
openSUSE 13.2 (src):    xen-4.4.2_06-23.1
Comment 13 Marcus Meissner 2015-12-19 16:37:08 UTC
released a while ago