Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 510312 - <app-emulation/xen-4.4.0-r3: input handling vulnerabilities loading guest kernel on ARM (XSA-95) (CVE-2014-{3714,3715,3716,3717})
Summary: <app-emulation/xen-4.4.0-r3: input handling vulnerabilities loading guest ker...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal trivial (vote)
Assignee: Gentoo Security
URL: http://www.openwall.com/lists/oss-sec...
Whiteboard: ~3 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2014-05-14 12:31 UTC by Agostino Sarubbo
Modified: 2015-01-04 02:28 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Agostino Sarubbo gentoo-dev 2014-05-14 12:31:18 UTC
From ${URL} :

                    Xen Security Advisory XSA-95
                             version 2

      input handling vulnerabilities loading guest kernel on ARM

UPDATES IN VERSION 2
====================

Public release.

ISSUE DESCRIPTION
=================

When loading a 32-bit ARM guest kernel the Xen tools did not correctly
validate the length of the kernel against the actual image size.  This
would then lead to an overrun on the input buffer when loading the
kernel into guest RAM.

Furthermore when checking a 32-bit guest kernel for an appended DTB,
the Xen tools were prone to additional overruns also leading to an
overrun on the input buffer when loading the kernel into guest RAM.
Also, the tools would access a field in the putative DTB header
without checking for its alignment.

When loading a 64-bit ARM guest kernel the tools similarly did not
fully validate the requested load addresses, possibly leading to an
overrun on the input buffer when loading the kernel into guest RAM.

IMPACT
======

An attacker who can control the kernel used to boot a guest can
exploit these issues.

Exploiting the overflow issues allows information which follows the
guest kernel in the toolstack address space to be copied into the
guest's memory, constituting an information leak.

Alternatively either the overflow or alignment issues could be used to
crash the toolstack process, leading to a denial of service.

VULNERABLE SYSTEMS
==================

ARM systems are vulnerable from Xen 4.4 onwards.

MITIGATION
==========

Ensuring that guests use only trustworthy kernels will avoid this
problem.

CREDITS
=======

This issue was discovered by Thomas Leonard.

RESOLUTION
==========

Applying the attached patch resolves this issue.

xsa95.patch        xen-unstable, Xen 4.4.x



@maintainer(s): since the package or the affected version has never been marked as stable, we don't need to stabilize it. After the bump, please remove the affected versions from the tree.
Comment 1 Yixun Lan archtester gentoo-dev 2014-05-14 14:25:03 UTC
Thanks for reporting, now we are tracking upstream's stable branch for security issue. And current, there is no XSA-95 patches committed, so let's wait for while.

also, I'd plan to request to stabilize 4.3.2-r2, 4.2.4-r2 (will CC in another bug)
Comment 2 Yixun Lan archtester gentoo-dev 2014-05-14 14:59:51 UTC
+*xen-tools-4.4.0-r3 (14 May 2014)
+
+  14 May 2014; Yixun Lan <dlan@gentoo.org> -xen-tools-4.4.0-r2.ebuild,
+  +xen-tools-4.4.0-r3.ebuild:
+  upstream patches bump, fix security bug #510312
Comment 3 Agostino Sarubbo gentoo-dev 2014-05-15 10:35:40 UTC
Closing as noglsa.
Comment 4 GLSAMaker/CVETool Bot gentoo-dev 2015-01-04 02:28:37 UTC
CVE-2014-3717 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3717):
  Xen 4.4.x does not properly validate the load address for 64-bit ARM guest
  kernels, which allows local users to read system memory or cause a denial of
  service (crash) via a crafted kernel, which triggers a buffer overflow.

CVE-2014-3716 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3716):
  Xen 4.4.x does not properly check alignment, which allows local users to
  cause a denial of service (crash) via an unspecified field in a DTB header
  in a 32-bit guest kernel.

CVE-2014-3715 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3715):
  Buffer overflow in Xen 4.4.x allows local users to read system memory or
  cause a denial of service (crash) via a crafted 32-bit guest kernel, related
  to searching for an appended DTB.

CVE-2014-3714 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3714):
  The ARM image loading functionality in Xen 4.4.x does not properly validate
  kernel length, which allows local users to read system memory or cause a
  denial of service (crash) via a crafted 32-bit ARM guest kernel in an image,
  which triggers a buffer overflow.