Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 170917 - app-emulation/xen-3.0.x QEMU VNC server allows remote root access (CVE-2007-0998)
Summary: app-emulation/xen-3.0.x QEMU VNC server allows remote root access (CVE-2007-0...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High trivial (vote)
Assignee: Gentoo Security
URL: https://bugzilla.redhat.com/bugzilla/...
Whiteboard: ~0?? [noglsa] jaervosz
Keywords:
Depends on:
Blocks: 151764
  Show dependency tree
 
Reported: 2007-03-14 17:54 UTC by Matt Drew (RETIRED)
Modified: 2007-05-02 18:51 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Matt Drew (RETIRED) gentoo-dev 2007-03-14 17:54:18 UTC
A user allowed to connect to a VM running on Xen/QEMU can use a command sequence (CTRL+ALT+2) to access the QEMU monitor mode.  In this mode, the user can do things like remap CD-ROM drive access to arbitrary files on the host machine, allowing read/write access to files such as /etc/passwd on the host.  Essentially by using this tool the guest OS can write to restricted files on the host OS.

http://rhn.redhat.com/errata/RHSA-2007-0114.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0998

This may not apply to us.  Xen is masked, and the vulnerability requires the QEMU console access to be enabled.  Red Hat's fix was to disable the QEMU monitor mode.  Can someone from the Xen herd look into this and verify that we have the problem?
Comment 1 Micheal Marineau (RETIRED) gentoo-dev 2007-03-14 18:46:55 UTC
I assume we have this issue, but I don't have the hardware to test xen with fully virtualized guests (which is the only time vnc/qemu would be used).  I can look into how to disable monitor mode and just hope...
Comment 2 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-03-25 06:48:04 UTC
xen please advise and patch as necessary.
Comment 3 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-04-04 06:51:00 UTC
xen please advise and patch as necessary.
Comment 4 Micheal Marineau (RETIRED) gentoo-dev 2007-04-11 00:37:27 UTC
Sorry for the delayed response, I was away from Gentoo for a while. I just now rolled a patch for Xen 3.0.4 similar to the one used by RedHat which is for Xen 3.0.3. Xen 3.0.4 is currently waiting in my overlay to push into portage. I don't yet have access to a machine that supports fully virtualized guests so my patch is entirely untested. As soon as I can test it I will push 3.0.4 into portage, which will also resolve a handful of other kernel related security issues.

Overlay: http://overlays.gentoo.org/svn/dev/marineam/xen
Patch: http://overlays.gentoo.org/svn/dev/marineam/xen/app-emulation/xen-tools/files/3.0.4_p1/xen-tools-remove-monitor-mode-from-vnc.patch
Comment 5 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-04-11 10:05:01 UTC
Thx Micheal.

Any ETA on when you can get it tested or do you want someone else to do it?
Comment 6 Micheal Marineau (RETIRED) gentoo-dev 2007-04-15 17:12:28 UTC
I now have hardware on order for the testing which should arrive in about a week to a week and a half.  If someone else has the ability to test things sooner then great. If someone can please ping me on irc or via email.
Comment 7 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-02 11:51:47 UTC
Micehal any news on this one?
Comment 8 Micheal Marineau (RETIRED) gentoo-dev 2007-05-02 16:50:42 UTC
(In reply to comment #7)
> Micehal any news on this one?
> 

I committed Xen 3.0.4 last night which includes this patch, so it is fixed now.

Xen 3.0.2 will remain in the tree for a little while since Xen upgrades can be quite nasty.
Comment 9 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2007-05-02 18:51:14 UTC
Thx Micheal. Please don't close security bugs though this time it was actually to be closed:)