[kernel-xen] Xen Security Advisory 64 (CVE-2013-4356) - Memory accessible by 64-bit PV guests under live migration

Steven Haigh netwiz at crc.id.au
Mon Sep 30 22:12:39 EST 2013


              Xen Security Advisory CVE-2013-4356 / XSA-64
                             version 3

      Memory accessible by 64-bit PV guests under live migration

UPDATES IN VERSION 3
====================

Public release.

ISSUE DESCRIPTION
=================

On some hardware, during live migration of 64-bit PV guests, some
parts of the guest's shadow pagetables are mistakenly filled in with
hypervisor mappings.  This causes Xen to crash when those mappings are
later cleared.  Before the crash, a malicious guest could use
hypercalls to cause Xen to read and write the parts of memory pointed
to by the stray mappings.

IMPACT
======

A malicious 64-bit PV guest, on a vulnerable host system, that can
arrange for itself to be live-migrated, could read or write memory at
high physical addresses on the host.

Note that once such a guest begins live migration the host is likely
to eventually crash, either when the live migration completes or on an
earlier page fault.  This crash could be avoided if the malicious
guest uses its improperly escalated privilege to prevent it.

VULNERABLE SYSTEMS
==================

Xen 4.3.x and xen-unstable are vulnerable.
Xen 4.2.x and earlier releases are not vulnerable.

In addition, only hosts with RAM extending past 5TB are affected.

On any host that is affected (and has not yet been successfully
attacked), live migration of a 64-bit PV guest will deterministically
crash the host.  If you can migrate a 64-bit PV guest from from host A
to host B, without crashing host A, then host A is not affected by
this bug.

MITIGATION
==========

Running only HVM and 32-bit PV guests or preventing live migration of
64-bit PV guests will avoid this issue.

CREDITS
=======

Andrew Cooper found the issue as a bug, which on examination by the
Xenproject.org Security Team turned out to be a security problem.

RESOLUTION
==========

Fixed in xen-4.2.3-2.el6

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 836 bytes
Desc: OpenPGP digital signature
URL: <https://lists.wireless.org.au/pipermail/kernel-xen/attachments/20130930/85e86058/attachment.sig>


More information about the kernel-xen mailing list