Bug 524124 (CVE-2009-3290)

Summary: CVE-2009-3290 kernel: KVM: x86: Disallow hypercalls for guest callers in rings > 0
Product: [Other] Security Response Reporter: Eugene Teo (Security Response) <eteo>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: bhu, ehabkost, khong, kreilly, lgoncalv, lihuang, lwang, rcvalle, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=important,source=kvm,public=20090803,reported=20090918,cvss2=7.2/AV:L/AC:L/Au:N/C:C/I:C/A:C,cwe=CWE-648
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-04-04 17:53:02 EDT Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 524125, 524126, 531657, 545646    
Bug Blocks:    

Description Eugene Teo (Security Response) 2009-09-17 20:16:37 EDT
Description of problem:
Unprivileged guest callers running in ring 3 can issue, e.g., MMU hypercalls. Normally, such callers cannot provide any hand-crafted MMU command structure as it has to be passed by its physical address, but they can still crash the guest kernel by passing random addresses or access the guest kernel memory, etc. This patch considers hypercalls valid only if issued from guest ring 0.

Upstream commit:
http://git.kernel.org/linus/07708c4af1346ab1521b26a202f438366b7bcffd

CVE request:
http://article.gmane.org/gmane.comp.security.oss.general/2130
http://permalink.gmane.org/gmane.comp.security.oss.general/2138

Ref: http://patchwork.kernel.org/patch/38926/
Comment 4 lihuang 2009-09-22 12:45:25 EDT
Reproduce in kvm-83-105.el5_4.3

Verified in kvm-83-105.el5_4.5
Comment 6 errata-xmlrpc 2009-09-29 11:02:52 EDT
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2009:1465 https://rhn.redhat.com/errata/RHSA-2009-1465.html
Comment 7 Fedora Update System 2009-10-02 07:00:10 EDT
kernel-2.6.27.35-170.2.94.fc10 has been submitted as an update for Fedora 10.
http://admin.fedoraproject.org/updates/kernel-2.6.27.35-170.2.94.fc10
Comment 8 Fedora Update System 2009-10-03 14:55:48 EDT
kernel-2.6.27.35-170.2.94.fc10 has been pushed to the Fedora 10 stable repository.  If problems still persist, please make note of it in this bug report.
Comment 9 Fedora Update System 2009-10-17 21:57:08 EDT
kernel-2.6.30.9-90.fc11 has been submitted as an update for Fedora 11.
http://admin.fedoraproject.org/updates/kernel-2.6.30.9-90.fc11
Comment 10 Fedora Update System 2009-10-27 02:47:07 EDT
kernel-2.6.30.9-90.fc11 has been pushed to the Fedora 11 stable repository.  If problems still persist, please make note of it in this bug report.