[kernel-xen] Xen Security Advisory 110 (CVE-2014-8595) - Missing privilege level checks in x86 emulation of far branches
Steven Haigh
netwiz at crc.id.au
Wed Nov 19 07:38:03 AEDT 2014
Xen Security Advisory CVE-2014-8595 / XSA-110
version 3
Missing privilege level checks in x86 emulation of far branches
UPDATES IN VERSION 3
====================
Public release.
ISSUE DESCRIPTION
=================
The emulation of far branch instructions (CALL, JMP, and RETF in Intel
assembly syntax, LCALL, LJMP, and LRET in AT&T assembly syntax)
incompletely performs privilege checks.
However these instructions are not usually handled by the emulator.
Exceptions to this are
- when a memory operand lives in (emulated or passed through) memory
mapped IO space,
- in the case of guests running in 32-bit PAE mode, when such an
instruction is (in execution flow) within four instructions of one
doing a page table update,
- when an Invalid Opcode exception gets raised by a guest instruction,
and the guest then (likely maliciously) alters the instruction to
become one of the affected ones,
- when the guest is in real mode (in which case there are no privilege
checks anyway).
IMPACT
======
Malicious HVM guest user mode code may be able to elevate its
privileges to guest supervisor mode, or to crash the guest.
VULNERABLE SYSTEMS
==================
Xen 3.2.1 and onward are vulnerable on x86 systems.
ARM systems are not vulnerable.
Only user processes in x86 HVM guests can take advantage of this
vulnerability.
MITIGATION
==========
Running only PV guests will avoid this issue.
There is no mitigation available for HVM guests.
CREDITS
=======
This issue was discovered by Jan Beulich of SUSE.
RESOLUTION
==========
xen-4.2: Tue Nov 18 2014 Steven Haigh <netwiz at crc.id.au> - 4.2.5-5
- XSA-109 (CVE-2014-8594) Insufficient restrictions on certain MMU
update hypercalls
- XSA-110 (CVE-2014-8595) Missing privilege level checks in x86
emulation of far branches
xen44-4.4: Tue Nov 18 2014 Steven Haigh <netwiz at crc.id.au> - 4.4.1-5
- XSA-109 (CVE-2014-8594) Insufficient restrictions on certain MMU
update hypercalls
- XSA-110 (CVE-2014-8595) Missing privilege level checks in x86
emulation of far branches
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 834 bytes
Desc: OpenPGP digital signature
URL: <https://lists.wireless.org.au/pipermail/kernel-xen/attachments/20141119/add4262f/attachment.sig>
More information about the kernel-xen
mailing list