Bug 1289125 (CVE-2015-8550, xsa155)

Summary: CVE-2015-8550 xsa155 xen: paravirtualized drivers incautious about shared memory contents (XSA-155)
Product: [Other] Security Response Reporter: Martin Prpič <mprpic>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED WONTFIX QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ailan, carnil, dhoward, drjones, fhrbata, imammedo, knoel, lwang, m.a.young, mguzik, mrezanin, nmurray, pbonzini, plougher, rkrcmar, rvrbovsk, security-response-team, vkuznets, xen-maint
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-03-07 10:47:14 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1292439    
Bug Blocks: 1290367    

Description Martin Prpič 2015-12-07 13:47:17 UTC
ISSUE DESCRIPTION
=================

The compiler can emit optimizations in the PV backend drivers which
can lead to double fetch vulnerabilities. Specifically the shared
memory between the frontend and backend can be fetched twice (during
which time the frontend can alter the contents) possibly leading to
arbitrary code execution in backend.

IMPACT
======

Malicious guest administrators can cause denial of service.  If driver
domains are not in use, the impact can be a host crash, or privilege escalation.

VULNERABLE SYSTEMS
==================

Systems running PV or HVM guests are vulnerable.

ARM and x86 systems are vulnerable.

All OSes providing PV backends are susceptible, this includes
Linux and NetBSD. By default the Linux distributions compile kernels
with optimizations.

External References:

http://xenbits.xen.org/xsa/advisory-155.html

Acknowledgements:

Red Hat would like to thank the Xen project for reporting this issue. Upstream acknowledges Felix Wilhelm (ERNW Research, KIT / Operating Systems Group) as the original reporter.

Comment 1 Martin Prpič 2015-12-17 13:15:57 UTC
Created xen tracking bugs for this issue:

Affects: fedora-all [bug 1292439]

Comment 2 Michael Young 2015-12-17 20:20:25 UTC
Note that xsa155 includes some patches that apply to the kernel and qemu packages as well as some to xen.

Comment 3 Fedora Update System 2015-12-22 22:00:33 UTC
xen-4.5.2-6.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.

Comment 4 Fedora Update System 2016-01-02 23:20:44 UTC
xen-4.5.2-6.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.