Bug 1140266 (CVE-2014-7155)

Summary: CVE-2014-7155 kernel: xen: Missing privilege level checks in x86 HLT, LGDT, LIDT, and LMSW emulation (XSA-105)
Product: [Other] Security Response Reporter: Petr Matousek <pmatouse>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: drjones, imammedo, jrusnack, pbonzini, rkrcmar, security-response-team, vkaigoro, vkuznets
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2014-09-10 15:34:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1145737    
Bug Blocks: 1140259    

Description Petr Matousek 2014-09-10 15:32:11 UTC
The emulation of the instructions HLT, LGDT, LIDT, and LMSW fails to
perform supervisor mode permission checks.

Malicious HVM guest user mode code may be able to crash the guest or
escalate its own privilege to guest kernel mode.

Acknowledgements:

Red Hat would like to thank the Xen for reporting this issue.

Comment 3 Petr Matousek 2014-09-10 15:34:32 UTC
Statement:

Not vulnerable.

This issue did not affect the versions of the kernel-xen package as shipped with Red Hat Enterprise Linux 5.

Comment 4 Petr Matousek 2014-09-23 15:22:14 UTC
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1145737]