[kernel-xen] Xen Security Advisory 61 - libxl partially sets up HVM passthrough even with disabled iommu

Steven Haigh netwiz at crc.id.au
Tue Sep 10 21:50:02 EST 2013


Sorry guys - false alarm.

I double checked all this - even though the XSA was released *after* the
release of 4.2.3, I automatically assumed that it was vulnerable in
4.2.3 - however it is already included in 4.2.3.

Sorry for the noise.

On 10/09/13 21:34, Steven Haigh wrote:
>                     Xen Security Advisory XSA-61
> 
>      libxl partially sets up HVM passthrough even with disabled iommu
> 
> ISSUE DESCRIPTION
> =================
> 
> With HVM domains, libxl's setup of PCI passthrough devices does the
> IOMMU setup after giving (via the device model) the guest access to
> the hardware and advertising it to the guest.
> 
> If the IOMMU is disabled the overall setup fails, but after the device
> has been made available to the guest; subsequent DMA instructions from
> the guest to the device will cause wild DMA.
> 
> IMPACT
> ======
> 
> A HVM domain, given access to a device which bus mastering capable in
> the absence of a functioning IOMMU, can mount a privilege escalation
> or denial of service attack affecting the whole system.
> 
> VULNERABLE SYSTEMS
> ==================
> 
> 1. Only systems which pass busmastering-capable PCI devices through to
>    untrusted guests are vulnerable.  (Most PCI devices are
>    busmastering-capable.)
> 
> 2. Only systems which use libxl as part of the toolstack are
>    vulnerable.
> 
>    The major consumer of libxl functionality is the xl toolstack which
>    became the default in Xen 4.2.
> 
>    In addition to this libvirt can optionally make use of libxl. This
>    can be queried with
>            # virsh version
>    which will report "xenlight" if libxl is in use.  libvirt currently
>    prefers the xend backend if xend is running.
> 
>    The xend and xapi toolstacks do not currently use libxl.
> 
> 3. Only Xen versions 4.0.x through 4.2.x are vulnerable.
> 
> 4. Only HVM domains can take advantage of this vulnerability.
> 
> 5. Systems which have a functioning IOMMU are NOT vulnerable.
> 
> MITIGATION
> ==========
> 
> This issue can be avoided by not assigning PCI devices to HVM guests
> when there is no functioning IOMMU.
> 
> NOTE REGARDING LACK OF EMBARGO
> ==============================
> 
> This issue was disclosed publicly on xen-devel; the person reporting
> it did not appreciate that it was a security issue.  Additionally the
> patch to fix the issue was already applied to the respective branches
> (in particular resulting in Xen 4.3 not being vulnerable).  Under the
> circumstances the Xen.org security team do not consider that this
> advisory should be embargoed.
> 
> Also, we apologise for the delay to this advisory message, which was
> due to an oversight by us.
> 
> CREDITS
> =======
> 
> George Dunlap found the issue as a bug, which on examination by the
> Xenproject.org Security Team turned out to be a security problem.
> 
> RESOLUTION
> ==========
> 
> xen-4.2.3-2 is currently being built and will be distributed to the
> mirrors shortly.
> 
> 
> 
> _______________________________________________
> kernel-xen mailing list
> kernel-xen at lists.wireless.org.au
> https://lists.wireless.org.au/mailman/listinfo/kernel-xen
> 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <https://lists.wireless.org.au/pipermail/kernel-xen/attachments/20130910/d4ee9527/attachment.sig>


More information about the kernel-xen mailing list