Bug 1186448 (CVE-2015-0239)

Summary: CVE-2015-0239 kernel: kvm: insufficient sysenter emulation when invoked from 16-bit code
Product: [Other] Security Response Reporter: Petr Matousek <pmatouse>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: aquini, areis, bhu, dhoward, ehabkost, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, knoel, lgoncalv, madhu.chinakonda, matt, mchehab, mcressma, mkenneth, mrezanin, mtosatti, nmurray, plougher, rt-maint, rvrbovsk, stefanha, virt-maint, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
It was found that the Linux kernel KVM subsystem's sysenter instruction emulation was not sufficient. An unprivileged guest user could use this flaw to escalate their privileges by tricking the hypervisor to emulate a SYSENTER instruction in 16-bit mode, if the guest OS did not initialize the SYSENTER model-specific registers (MSRs). Note: Certified guest operating systems for Red Hat Enterprise Linux with KVM do initialize the SYSENTER MSRs and are thus not vulnerable to this issue when running on a KVM hypervisor.
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 02:38:32 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1186449, 1186450, 1186451, 1186452, 1186453    
Bug Blocks: 1180219    

Description Petr Matousek 2015-01-27 16:59:16 UTC
It was found that the Linux kernel KVM subsystem's sysenter instruction
emulation was not sufficient.

An unprivileged guest user could use this flaw to escalate their privileges by
tricking the hypervisor to emulate a SYSENTER instruction in 16-bit mode, if
the guest OS does not initialize the SYSENTER MSRs.

Please note that the Red Hat Enterprise Linux with KVM certified guest operating
systems do initialize the SYSENTER MSRs and are thus not vulnerable to
this issue when running on KVM hypervisor.

References:
http://www.openwall.com/lists/oss-security/2015/01/27/6

Upstream patch:
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f3747379accba8e95d70cec0eae0582c8c182050

Acknowledgements:

Red Hat would like to thank Nadav Amit for reporting this issue.

Comment 2 Petr Matousek 2015-01-27 17:00:50 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1186453]

Comment 4 Petr Matousek 2015-01-27 17:07:19 UTC
Statement:

This issue did not affect the kvm packages as shipped with Red Hat Enterprise Linux 5 as they lack support for sysenter instruction emulation.

This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 7. A future update may address this issue.

Please note that the Red Hat Enterprise Linux with KVM certified guest operating
systems do initialize the SYSENTER MSRs and are thus not vulnerable to
this issue when running on KVM hypervisor.

Comment 6 Fedora Update System 2015-02-06 04:00:25 UTC
kernel-3.18.5-201.fc21 has been pushed to the Fedora 21 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 7 Fedora Update System 2015-02-07 04:01:06 UTC
kernel-3.18.5-101.fc20 has been pushed to the Fedora 20 stable repository.  If problems still persist, please make note of it in this bug report.

Comment 8 errata-xmlrpc 2015-07-22 08:41:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2015:1272 https://rhn.redhat.com/errata/RHSA-2015-1272.html

Comment 9 errata-xmlrpc 2015-11-19 21:19:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2152 https://rhn.redhat.com/errata/RHSA-2015-2152.html

Comment 10 errata-xmlrpc 2015-11-19 23:24:18 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2152 https://rhn.redhat.com/errata/RHSA-2015-2152.html